ComputationWorld 2018
February 18 - 22, 2018 - Barcelona, Spain

  • SERVICE COMPUTATION 2018, The Tenth International Conference on Advanced Service Computing
  • CLOUD COMPUTING 2018, The Ninth International Conference on Cloud Computing, GRIDs, and Virtualization
  • FUTURE COMPUTING 2018, The Tenth International Conference on Future Computational Technologies and Applications
  • COGNITIVE 2018, The Tenth International Conference on Advanced Cognitive Technologies and Applications
  • ADAPTIVE 2018, The Tenth International Conference on Adaptive and Self-Adaptive Systems and Applications
  • CONTENT 2018, The Tenth International Conference on Creative Content Technologies
  • PATTERNS 2018, The Tenth International Conference on Pervasive Patterns and Applications
  • COMPUTATION TOOLS 2018, The Ninth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
  • BUSTECH 2018, The Eighth International Conference on Business Intelligence and Technology

DigitalWorld 2018
March 25 - 29, 2018 - Rome, Italy

  • ICDS 2018, The Twelfth International Conference on Digital Society and eGovernments
  • ACHI 2018, The Eleventh International Conference on Advances in Computer-Human Interactions
  • GEOProcessing 2018, The Tenth International Conference on Advanced Geographic Information Systems, Applications, and Services
  • eTELEMED 2018, The Tenth International Conference on eHealth, Telemedicine, and Social Medicine
  • eLmL 2018, The Tenth International Conference on Mobile, Hybrid, and On-line Learning
  • eKNOW 2018, The Tenth International Conference on Information, Process, and Knowledge Management
  • ALLSENSORS 2018, The Third International Conference on Advances in Sensors, Actuators, Metering and Sensing
  • SMART ACCESSIBILITY 2018, The Third International Conference on Universal Accessibility in the Internet of Things and Smart Environments

NexComm 2018
April 22 - 26, 2018 - Athens, Greece

  • ICDT 2018, The Thirteenth International Conference on Digital Telecommunications
  • SPACOMM 2018, The Tenth International Conference on Advances in Satellite and Space Communications
  • ICN 2018, The Seventeenth International Conference on Networks
    • SOFTNETWORKING 2018, The International Symposium on Advances in Software Defined Networking and Network Functions Virtualization
  • ICONS 2018, The Thirteenth International Conference on Systems
  • MMEDIA 2018, The Tenth International Conference on Advances in Multimedia
  • PESARO 2018, The Eighth International Conference on Performance, Safety and Robustness in Complex Systems and Applications
  • CTRQ 2018, The Eleventh International Conference on Communication Theory, Reliability, and Quality of Service
  • COCORA 2018, The Eighth International Conference on Advances in Cognitive Radio
  • ALLDATA 2018, The Fourth International Conference on Big Data, Small Data, Linked Data and Open Data
    • KESA 2018, The International Workshop on Knowledge Extraction and Semantic Annotation
  • SOFTENG 2018, The Fourth International Conference on Advances and Trends in Software Engineering

InfoSys 2018
May 20 - 24, 2018 - Nice, France

  • ICNS 2018, The Fourteenth International Conference on Networking and Services
  • ICAS 2018, The Fourteenth International Conference on Autonomic and Autonomous Systems
  • ENERGY 2018, The Eighth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
  • WEB 2018, The Sixth International Conference on Building and Exploring Web Based Environments
  • DBKDA 2018, The Tenth International Conference on Advances in Databases, Knowledge, and Data Applications
    • GraphSM 2018, The Fifth International Workshop on Large-scale Graph Analysis, Management and Applications
  • SIGNAL 2018, The Third International Conference on Advances in Signal, Image and Video Processing

BioSciencesWorld 2018
May 20 - 24, 2018 - Nice, France

  • BIOTECHNO 2018, The Tenth International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies
  • BIONATURE 2018, The Ninth International Conference on Bioenvironment, Biodiversity and Renewable Energies

DataSys 2018
July 22 - 26, 2018- Barcelona, Spain

  • AICT 2018, The Fourteenth Advanced International Conference on Telecommunications
  • ICIW 2018, The Thirteenth International Conference on Internet and Web Applications and Services
  • ICIMP 2018, The Thirteenth International Conference on Internet Monitoring and Protection
  • SMART 2018, The Seventh International Conference on Smart Cities, Systems, Devices and Technologies
  • IMMM 2018, The Eighth International Conference on Advances in Information Mining and Management
  • INFOCOMP 2018, The Eighth International Conference on Advanced Communications and Computation
    • MODOPT 2018, The International Symposium on Modeling and Optimization
  • MOBILITY 2018, The Eighth International Conference on Mobile Services, Resources, and Users
  • SPWID 2018, The Fourth International Conference on Smart Portable, Wearable, Implantable and Disability-oriented Devices and Systems
  • ACCSE 2018, The Third International Conference on Advances in Computation, Communications and Services

(to be completed)

 


ThinkMind // SECURWARE 2017, The Eleventh International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Download: SECURWARE 2017 cover page

Download: SECURWARE 2017 foreword page

Download: SECURWARE 2017 committee page

Download: SECURWARE 2017 table of contents

Download: SECURWARE 2017 full proceedings

Notes: IARIA Conference.

Editors:
Carla Merkle Westphall, Federal University of Santa Catarina, Brazil
Hans-Joachim Hof, Technical University of Ingolstadt, Germany
Aspen Olmsted, College of Charleston, USA
Stefan Schauer, Scientist, Austrian Institute of Technology, Center of
Digital Safety and Security, Vienna, Austria
Martin Latzenhofer, Scientist, Austrian Institute of Technology, Center
of Digital Safety and Security, Vienna, Austria
Aysajan Abidin, KU Leuven, Belgium
George Yee, Carleton University & Aptusinnova Inc., Ottawa, Canada

Event editions: - there are 7 editions.

ISSN: 2162-2116

ISBN: 978-1-61208-582-1

Location: Rome, Italy

Dates: from September 10, 2017 to September 14, 2017

Articles: there are 32 articles

A Novel Central Arbiter to Mitigate Denial of Service Attacks on Duplicate Address Detection in IPv6 Networks
Shailendra Singh Tomar, Anil Rawat, Prakash D. Vyavahare, and Sanjiv Tokekar
keywords: IPv6; DAD; DoS Attack; Central Arbiter Approach; SDN; NDP

A Context-Aware Malware Detection Based on Low-Level Hardware Indicators as a Last Line of Defense
Alireza Sadighian, Jean-Marc Robert, Saeed Sarencheh, and Souradeep Basu
keywords: Malware Detection; Low-level Indicators; Context- Aware; Machine Learning; Time-Series Analysis; Ontologies

Clustering based Evolving Neural Network Intrusion Detection for MCPS Traffic Security
Nishat I Mowla, Inshil Doh, and Kijoon Chae
keywords: Intrusion Detection; Machine Intelligence; Clustering; Neural Networks; Medical Cyber Physical Systems.

An Empirical Study of Root-Cause Analysis in Information Security Management
Gaute Wangen, Niclas Hellesen, Henrik Torres, and Erlend Brækken
keywords: Information Security; Root cause analysis; Risk Management; Case study.

Library-Level Policy Enforcement
Marinos Tsantekidis and Vassilis Prevelakis
keywords: policies; library calls; argument examination; wrapper functions

Netflow Based HTTP Get Flooding Attack Analysis
Jungtae Kim, Jong-Hyun Kim, Ikkyun Kim, and Koohong Kang
keywords: HTTP Get Flooding, Netflow, DDoS Attack

Secure Software Development – Models, Tools, Architectures and Algorithms
Aspen Olmsted
keywords: Cyber-security; Software Engineering; CRM

Security Vulnerabilities in Hotpatching in Mobile Applications
Sarah Ford and Aspen Olmsted
keywords: Javascript; iOS; patching; mobile computing; open-source tools; Apple; security

Secure Development of Healthcare Medical Billing Software
Paige Peck and Aspen Olmsted
keywords: Healthcare billing software; Current Procedural Terminology; CPT codes; Healthcare Common Procedure Coding System; HCPCS codes; Salesforce Cloud development

Attack Maze for Network Vulnerability Analysis
Stanley Chow
keywords: Network security; vulnerability analysis; scalable; vulnerability; exploit; maximum incursion; cyber security; metric; security metric; mission dependency

A Survey on Open Automotive Forensics
Robert Altschaffel, Kevin Lamshöft, Stefan Kiltz, and Jana Dittmann
keywords: automotive; computer forensics; embedded systems; forensic processes; safety & security.

A Method for Preventing Slow HTTP DoS attacks
Koichi Ozaki, Astushi Kanai, and Shigeaki Tanimoto
keywords: Slow HTTP DoS Attack; session time; packet interval.

Mutual Authentication Scheme for Lightweight IoT Devices
Seungyong Yoon and Jeongnyeo Kim
keywords: IoT, security, authentication

Identifying and Managing Risks in Interconnected Utility Networks
Stefan Schauer, Sandra König, Martin Latzenhofer, and Stefan Rass
keywords: risk management; interconnected utility networks; game theory; ISO 31000

Protecting Eavesdropping over Multipath TCP Communication Based on Not-Every-Not-Any Protection
Toshihiko Kato, Shihan Cheng, Ryo Yamamoto, Satoshi Ohzahata, and Nobuo Suzuki
keywords: Multipath TCP; Eavesdropping; Data Dispersion; Data Scrambling.

Visual Risk Specification and Aggregation
Jasmin Wachter, Thomas Grafenauer, and Stefan Rass
keywords: uncertainty representation; expert elicitation; risk assessment; opinion pooling

Addressing Complex Problem Situations in Critical Infrastructures using Soft Systems Analysis: The CS-AWARE Approach
Thomas Schaberreiter, Chris Wills, Gerald Quirchmayr, and Juha Röning
keywords: Cybersecurity; Critical Infrastructures; System Analysis; Soft Systems Methodology; Socio-technological Analysis; Cyber Situational Awareness; Information Sharing.

Stochastic Dependencies Between Critical Infrastructures
Sandra König and Stefan Rass
keywords: critical infrastructure; stochastic dependencies; Markov chain; risk propagation

Assessing Security Protection for Sensitive Data
George O. M. Yee
keywords: assessment, security, protection, sensitive data, vulnerability

RMDM – A Conceptual ICT Risk-Meta-Data-Model - Applied to COBIT for Risk as underlying Risk Model
Martin Latzenhofer and Gerald Quirchmayr
keywords: information and communication technology risk management; ICT risk-meta-data-model; COBIT for Risk; metamodeling; data model; UML

Recommendations for Risk Analysis in Higher Education Institutions
Lidia Prudente Tixteco, María del Carmen Prudente Tixteco, Gabriel Sánchez Pérez, Linda Karina Toscano Medina, José de Jesús Vázquez Gómez, and Arturo De la Cruz Tellez
keywords: risk analysis; higher education institutions; information systems

Extending Vehicle Attack Surface Through Smart Devices
Rudolf Hackenberg, Nils Weiss, Sebastian Renner, and Enrico Pozzobon
keywords: On-Board-Diagnostics; Cellular Network; Automotive Security

An Analysis of Automotive Security Based on a Reference Model for Automotive Cyber Systems
Jasmin Brückmann, Tobias Braun, and Hans-Joachim Hof
keywords: Automotive Security; Automotive Cyber System; Cyber-Phyiscal System;

Policy-Aware Provisioning Plan Generation for TOSCA-based Applications
Kálmán Képes, Uwe Breitenbücher, Markus Philipp Fischer, Frank Leymann, and Michael Zimmermann
keywords: Cloud Computing, Application Provisioning, Security, Policies, Automation

Towards an Approach for Automatically Checking Compliance Rules in Deployment Models
Markus Fischer, Uwe Breitenbücher, Kálmán Képes, and Frank Leymann
keywords: Cloud Computing; Compliance; Security; Policies;

Investigating SLA Confidentiality Requirements: A Holistic Perspective for the Government Agencies
Yudhistira Nugraha and Andrew Martin
keywords: Security, Trust, Assurance, Confidentiality Requirements, Service Level Agreement (SLA), Service Provision

Large-Scale Analysis of Domain Blacklists
Tran Phuong Thao, Tokunbo Makanju, Jumpei Urakawa, Akira Yamada, Kosuke Murakami, and Ayumu Kubota
keywords: Web Security; Large-Scale Analysis; Empirical Analysis; Blacklist; Malicious Domain

Hugin: A Scalable Hybrid Android Malware Detection System
Dominik Teubert, Johannes Krude, Samuel Schueppen, and Ulrike Meyer
keywords: mobile malware detection; app vetting; machine-learning

Towards Protected Firmware Verification in Low-power Devices
Yong-Hyuk Moon and Jeong-Nyeo Kim
keywords: firmware verification, memory protection, device security

A System to Save the Internet from the Malicious Internet of Things at Home
Lukas Braun and Hans-Joachim Hof
keywords: secure smart home; Internet of Things security; IoT security; network security; smart home; IoT

Frictionless Authentication System: Security & Privacy Analysis and Potential Solutions
Mustafa Mustafa, Aysajan Abidin, and Enrique Argones Rúa
keywords: Frictionless authentication; Threat analysis; Security and privacy requirements; Threshold signature; Fuzzy extractors.

Frictionless Authentication Systems: Emerging Trends, Research Challenges and Opportunities
Tim Van hamme, Vera Rimmer, Davy Preuveneers, Wouter Joosen, Mustafa Mustafa, Aysajan Abidin, and Enrique Argones Rúa
keywords: Frictionless authentication; Behaviometrics; Security; Privacy; Usability.

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.