|
|
InfoSys 2025 Congress March 09, 2025 to March 13, 2025 - Lisbon, Portugal
- ICNS 2025, The Twenty-Second International Conference on Networking and Services
- ICAS 2025, The Twenty-Second International Conference on Autonomic and Autonomous Systems
- ENERGY 2025, The Fifteenth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
- WEB 2025, The Thirteenth International Conference on Building and Exploring Web Based Environments
- DBKDA 2025, The Seventeenth International Conference on Advances in Databases, Knowledge, and Data Applications
- SIGNAL 2025, The Tenth International Conference on Advances in Signal, Image and Video Processing
- BIOTECHNO 2025, The Seventeenth International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies
- AIHealth 2025, The Second International Conference on AI-Health
InfoWare 2025 Congress March 09, 2025 to March 13, 2025 - Lisbon, Portugal
- ICCGI 2025, The Twentieth International Multi-Conference on Computing in the Global Information Technology
- ICWMC 2025, The Twenty-Second International Conference on Wireless and Mobile Communications
- VEHICULAR 2025, The Fourteenth International Conference on Advances in Vehicular Systems, Technologies and Applications
- INTERNET 2025, The Seventeenth International Conference on Evolving Internet
- COLLA 2025, The Fifteenth International Conference on Advanced Collaborative Networks, Systems and Applications
- INTELLI 2025, The Fourteenth International Conference on Intelligent Systems and Applications
- VISUAL 2025, The Tenth International Conference on Applications and Systems of Visual Paradigms
- HUSO 2025, The Eleventh International Conference on Human and Social Analytics
- BRAININFO 2025, The Tenth International Conference on Neuroscience and Cognitive Brain Information
DataSys 2025 Congress April 06, 2025 to April 10, 2025 - Valencia, Spain
- AICT 2025, The Twenty-Second Advanced International Conference on Telecommunications
- ICIW 2025, The Twentieth International Conference on Internet and Web Applications and Services
- ICIMP 2025, The Twentieth International Conference on Internet Monitoring and Protection
- SMART 2025, The Fourteenth International Conference on Smart Cities, Systems, Devices and Technologies
- IMMM 2025, The Fifteenth International Conference on Advances in Information Mining and Management
- INFOCOMP 2025, The Fifteenth International Conference on Advanced Communications and Computation
- MOBILITY 2025, The Fifteenth International Conference on Mobile Services, Resources, and Users
- SPWID 2025, The Eleventh International Conference on Smart Portable, Wearable, Implantable and Disability-oriented Devices and Systems
- ACCSE 2025, The Tenth International Conference on Advances in Computation, Communications and Services
ComputationWorld 2025 Congress April 06, 2025 to April 10, 2025 - Valencia, Spain
- SERVICE COMPUTATION 2025, The Seventeenth International Conference on Advanced Service Computing
- CLOUD COMPUTING 2025, The Sixteenth International Conference on Cloud Computing, GRIDs, and Virtualization
- FUTURE COMPUTING 2025, The Seventeenth International Conference on Future Computational Technologies and Applications
- COGNITIVE 2025, The Seventeenth International Conference on Advanced Cognitive Technologies and Applications
- ADAPTIVE 2025, The Seventeenth International Conference on Adaptive and Self-Adaptive Systems and Applications
- CONTENT 2025, The Seventeenth International Conference on Creative Content Technologies
- PATTERNS 2025, The Seventeenth International Conference on Pervasive Patterns and Applications
- COMPUTATION TOOLS 2025, The Sixteenth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
- BUSTECH 2025, The Fifteenth International Conference on Business Intelligence and Technology
- AIVR 2025, The Second International Conference on Artificial Intelligence and Immersive Virtual Reality
NexComm 2025 Congress May 18, 2025 to May 22, 2025 - Nice, France
- ICDT 2025, The Twentieth International Conference on Digital Telecommunications
- SPACOMM 2025, The Seventeenth International Conference on Advances in Satellite and Space Communications
- ICN 2025, The Twenty-Fourth International Conference on Networks
- ICONS 2025, The Twentieth International Conference on Systems
- MMEDIA 2025, The Seventeenth International Conference on Advances in Multimedia
- PESARO 2025, The Fifteenth International Conference on Performance, Safety and Robustness in Complex Systems and Applications
- CTRQ 2025, The Eighteenth International Conference on Communication Theory, Reliability, and Quality of Service
- ALLDATA 2025, The Eleventh International Conference on Big Data, Small Data, Linked Data and Open Data
- SOFTENG 2025, The Eleventh International Conference on Advances and Trends in Software Engineering
DigitalWorld 2025 Congress May 18, 2025 to May 22, 2025 - Nice, France
- ICDS 2025, The Nineteenth International Conference on Digital Society
- ACHI 2025, The Eighteenth International Conference on Advances in Computer-Human Interactions
- GEOProcessing 2025, The Seventeenth International Conference on Advanced Geographic Information Systems, Applications, and Services
- eTELEMED 2025, The Seventeenth International Conference on eHealth, Telemedicine, and Social Medicine
- eLmL 2025, The Seventeenth International Conference on Mobile, Hybrid, and On-line Learning
- eKNOW 2025, The Seventeenth International Conference on Information, Process, and Knowledge Management
- ALLSENSORS 2025, The Tenth International Conference on Advances in Sensors, Actuators, Metering and Sensing
- SMART ACCESSIBILITY 2025, The Tenth International Conference on Universal Accessibility in the Internet of Things and Smart Environments
IARIA Congress 2025, The 2025 IARIA Annual Congress on Frontiers in Science, Technology, Services, and Applications July 06, 2025 to July 10, 2025 - Athens, Greece
DigiTech 2025 Congress July 06, 2025 to July 10, 2025 - Athens, Greece
- DIGITAL 2025, Advances on Societal Digital Transformation
- IoTAI 2025, The Second International Conference on IoT-AI
- GPTMB 2025, The Second International Conference on Generative Pre-trained Transformer Models and Beyond
NexTech 2025 Congress September 28, 2025 to October 02, 2025 - Lisbon, Portugal
- UBICOMM 2025, The Nineteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
- ADVCOMP 2025, The Nineteenth International Conference on Advanced Engineering Computing and Applications in Sciences
- SEMAPRO 2025, The Nineteenth International Conference on Advances in Semantic Processing
- AMBIENT 2025, The Fifteenth International Conference on Ambient Computing, Applications, Services and Technologies
- EMERGING 2025, The Seventeenth International Conference on Emerging Networks and Systems Intelligence
- DATA ANALYTICS 2025, The Fourteenth International Conference on Data Analytics
- GLOBAL HEALTH 2025, The Fourteenth International Conference on Global Health Challenges
- CYBER 2025, The Tenth International Conference on Cyber-Technologies and Cyber-Systems
SoftNet 2025 Congress September 28, 2025 to October 02, 2025 - Lisbon, Portugal
- ICSEA 2025, The Twentieth International Conference on Software Engineering Advances
- ICSNC 2025, The Twentieth International Conference on Systems and Networks Communications
- CENTRIC 2025, The Eighteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
- VALID 2025, The Seventeenth International Conference on Advances in System Testing and Validation Lifecycle
- SIMUL 2025, The Seventeenth International Conference on Advances in System Simulation
- SOTICS 2025, The Fifteenth International Conference on Social Media Technologies, Communication, and Informatics
- INNOV 2025, The Fourteenth International Conference on Communications, Computation, Networks and Technologies
- AISyS 2025, The Second International Conference on AI-based Systems and Services
SocSys 2025 Congress October 26, 2025 to October 30, 2025 - Barcelona, Spain
NetWare 2025 Congress October 26, 2025 to October 30, 2025 - Barcelona, Spain
- SENSORCOMM 2025, The Nineteenth International Conference on Sensor Technologies and Applications
- SENSORDEVICES 2025, The Sixteenth International Conference on Sensor Device Technologies and Applications
- SECURWARE 2025, The Nineteenth International Conference on Emerging Security Information, Systems and Technologies
- AFIN 2025, The Seventeenth International Conference on Advances in Future Internet
- CENICS 2025, The Eighteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
- ICQNM 2025, The Nineteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
- FASSI 2025, The Eleventh International Conference on Fundamentals and Advances in Software Systems Integration
- GREEN 2025, The Tenth International Conference on Green Communications, Computing and Technologies
- HEALTHINFO 2025, The Tenth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing
TechWorld 2025 Congress October 26, 2025 to October 30, 2025 - Barcelona, Spain
|
|
|
|
|
ThinkMind // SECURWARE 2015, The Ninth International Conference on Emerging Security Information, Systems and Technologies
Type: conference Download: SECURWARE 2015 cover page Download: SECURWARE 2015 foreword page Download: SECURWARE 2015 committee page Download: SECURWARE 2015 table of contents Download: SECURWARE 2015 full proceedings Notes: IARIA Conference. Editors: Rainer Falk, Siemens AG - München, Germany Carla Merkle Westphall, Federal University of Santa Catarina, Brazil Hans-Joachim Hof, Munich University of Applied Sciences, Germany Event editions: - there are 14 editions. ISSN: 2162-2116 ISBN: 978-1-61208-427-5 Location: Venice, Italy Dates: from August 23, 2015 to August 28, 2015 Articles: there are 31 articles Risk Assessment Quantification in Hybrid Cloud Configuration Shigeaki Tanimoto, Tsutomu Konosu, Motoi Iwashita, Hiroyuki Sato, and Atsushi Kanai keywords: Risk Assessment; Hybrid Cloud Configuration; Risk Matrix; Risk Value Formula; Information Security Management System (ISMS)
Network Security Incident Detection Based on Network Topology Patterns Juris Viksna, Karlis Freivalds, Mikus Grasmanis, Peteris Rucevskis, Baiba Kaskina, and Varis Teivans keywords: Network security; Data visualization; Graph topology patterns
Traffic Management and Access Control in Space Experiment “Kontur-2” Vladimir Muiukha, Vladimir Zaborovsky, Alexander Ilyashenko, and Alexander Silinenko keywords: space experiment; access control; traffic management; virtual connection
Secure Scrum: Development of Secure Software with Scrum Christoph Pohl and Hans-Joachim Hof keywords: Secure Scrum; Security; Secure Software Development; Software Security; SDL
Enhanced Authenticated Encryption Scheme Jamal Azzam keywords: encryption ; decryption ; hash function ; secret key
New Directions in Applying Physical Unclonable Functions Rainer Falk and Steffen Fries keywords: physical unclonable function; key extraction; embedded security; licensing; configuration integrity
The Random Gate Principle Sheagan John and Curtis Busby-Earle keywords: algorithm; encryption; gate; symmetric
Comparison of the PM-DC-LM Mode with the Other Common Block Cipher Modes of Operation Petr Zacek, Roman Jasek, and David Malanik keywords: cryptography; block cipher; mode of operation; PM-DC-LM; polymorphism; deterministic chaos; logistic map
An Improved Threshold Proxy Signature Scheme Akanksha Gupta, Prakash D. Vyavahare, and Manish Panchal keywords: Proxy signature, Threshold signature, secret sharing, RSA
The Use of Acceptance Test-Driven Development in the Construction of Cryptographic Software Alexandre Braga, Daniela Schwab, and André Vannucci keywords: BDD; TDD; ATDD; User stories; Security; Test vectors; Cryptography; Assurance
Secret Sharing Schemes Threshold Determination Armindo Guerra Jr. and Ricardo Felipe Custodio keywords: Secret Sharing, threshold, information
Enterprise Security Metrics with the ADVISE Meta Model Formalism Ken Keefe, Brett Feddersen, William Sanders, Carol Muehrcke, Donald Parks, Andrew Crapo, Alfredo Gabaldon, and Ravi Palla keywords: Quantitative Security Analysis; State-based Security Model; Discrete Event Simulation; Adversary Behavior Model
Implementation Issues in the Construction of an Application Framework for Secure SMS Messages on Android Smartphones Alexandre Braga, Romulo Zanco Neto, André Vannucci, and Ricardo Hiramatsu keywords: SMS; Cryptography; Android; Security
A Review and Analysis on Heartbleed on Italian Websites, a Year Later Vito Santarcangelo, Giuseppe Oddo, Domenico Di Carlo, Fabrizio Valenti, Imran Tariq, and Claudio Fornaro keywords: Heartbleed; OpenSSL; Poodle; Freak; Vulnerability.
A Detection and Prevention Algorithm for Single and Cooperative Black hole Attacks in AODV MANETs Seed Khalil and Noureldien Abdelrahman keywords: MANET attacks; Black hole attack; Black hole attack detection; single Black hole attack; Cooperative black hole attack.
A Brief Survey of Nonces and Nonce Usage Geir Køien keywords: Number-used-once; Nonce; Randomness; Freshness; Timeliness; Uniqueness; Non-repeatability; Cryptographic protocol.
A Model for Conducting Security Assessment within an Organisation Nor Fatimah Awang and Azizah Abd Manaf keywords: Web application; vulnerability; security testing; security assessment; penetration testing
Cloud Card Compliance Checklist: An Efficient Tool for Securing Deployment Card Solutions on the Cloud Hassan El Alloussi, Laila Fetjah, and Abdelhak Chaichaa keywords: Cloud Computing; PCI-DSS; Card Industry; PCI-SSC; Cloud Computing Alliance (CSA); Cloud Controls Matrix (CCM)
Ceremony Analysis Meets Verifiable Voting: Individual Verifiability in Helios Taciane Martimiano, Eduardo dos Santos, Maina Olembo, Jean Everson Martina, and Ricardo Alexandre Reinaldo de Moraes keywords: Voting; Threat models; Security Ceremonies
Mobile Agent Security Using Reference Monitor-based Security Framework Sandhya Armoogum, Nawaz Mohamudally, and Nimal Nissanke keywords: Security; Mobile agents; Reference monitor, Trust
An IDS for Browser Hijacking Diogo Monica and Carlos Ribeiro keywords: IDS, Browser hijacking, Malicious attack detection, User empowerment
Monitoring of Malware Communication Channels Radovan Holik and Roman Jašek keywords: HTTP; DNS; C&C; malware detection
Organic Principles to Counter Malware in Automotive Environments Robert Altschaffel, Sven Kuhlmann, Jana Dittmann, and Tobias Hoppe keywords: automotive security; adaptive systems; malware
Apate - A Linux Kernel Module for High Interaction Honeypots Christoph Pohl, Michael Meier, and Hans-Joachim Hof keywords: Honeypot; Intrusion Detection; Linux Kernel; Rule Engine
Automatic Human Tracking using Localization of Neighbor Node Calculation Tappei Yotsumoto, Kozo Tanigawa, Miki Tsuji, Kenichi Takahashi, Takao Kawamura, and Kazunori Sugahara keywords: Human tracking; Mobile agent; Pan/Tilt/Zoom; Neighbor relation; Localization.
Implementation of a Generic ICT Risk Model using Graph Databases Stefan Schiebeck, Martin Latzenhofer, Brigitte Palensky, Stefan Schauer, Gerald Quirchmayr, Thomas Benesch, Johannes Göllner, Christian Meurers, and Ingo Mayr keywords: risk management; APT; ICT security; graph databases; interconnected risk model
Reduction of Neighbor Node Calculations for Automatic Human Tracking System Miki Tsuji, Tappei Yotsumoto, Kenichi Takahashi, Kozo Tanigawa, Takao Kawamura, and Kazunori Sugahara keywords: Human tracking; Mobile agent; Pan / Tilt / Zoon; Neighbor relation; Localization
Overview on Security Approaches in Intelligent Transportation Systems Christoph Ponikwar and Hans-Joachim Hof keywords: security, security issues, security architectures, VANET, MANET, ITS.
A Novel Financial Instrument to Incentivize Investments in Information Security Controls and Mitigate Residual Risk Pankaj Pandey and Steven De Haes keywords: Information Security; Security Economics; Risk Management; Financial Instrument.
You Are Who You Know - Leveraging Webs-of-trust for Authentication in Identity Federations Bob Hulsebosch, Arnout Van Velzen, Maarten Wegdam, Martijn Oostdijk, Remco Poortinga-van Wijnen, and Joost Van Dijk keywords: authentication; web-of-trust; level of assurance; attestation service; identity proofing
Different Aproaches to Security Incidents and Proposal of Severity Assessment of Security Incident Lukas Kralik, Roman Senkerik, and Petr Stipek keywords: cyber security; security; incident; assessment of severity; ISMS; information security; incident management
|
|
SERVICES CONTACT
2010 - 2022 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy. |
|
|
|