InfoSys 2023 Congress
March 13, 2023 to March 17, 2023 - Barcelona, Spain

  • ICNS 2023, The Nineteenth International Conference on Networking and Services
  • ICAS 2023, The Nineteenth International Conference on Autonomic and Autonomous Systems
  • ENERGY 2023, The Thirteenth International Conference on Smart Grids, Green Communications and IT Energy-aware Technologies
  • WEB 2023, The Eleventh International Conference on Building and Exploring Web Based Environments
  • DBKDA 2023, The Fifteenth International Conference on Advances in Databases, Knowledge, and Data Applications
  • SIGNAL 2023, The Eighth International Conference on Advances in Signal, Image and Video Processing
  • BIOTECHNO 2023, The Fifteenth International Conference on Bioinformatics, Biocomputational Systems and Biotechnologies

InfoWare 2023 Congress
March 13, 2023 to March 17, 2023 - Barcelona, Spain

  • ICCGI 2023, The Eighteenth International Multi-Conference on Computing in the Global Information Technology
  • ICWMC 2023, The Nineteenth International Conference on Wireless and Mobile Communications
  • VEHICULAR 2023, The Twelfth International Conference on Advances in Vehicular Systems, Technologies and Applications
  • INTERNET 2023, The Fifteenth International Conference on Evolving Internet
  • COLLA 2023, The Thirteenth International Conference on Advanced Collaborative Networks, Systems and Applications
  • INTELLI 2023, The Twelfth International Conference on Intelligent Systems and Applications
  • VISUAL 2023, The Eighth International Conference on Applications and Systems of Visual Paradigms
  • HUSO 2023, The Ninth International Conference on Human and Social Analytics
  • BRAININFO 2023, The Eighth International Conference on Neuroscience and Cognitive Brain Information

NexComm 2023 Congress
April 24, 2023 to April 28, 2023 - Venice, Italy

  • ICDT 2023, The Eighteenth International Conference on Digital Telecommunications
  • SPACOMM 2023, The Fifteenth International Conference on Advances in Satellite and Space Communications
  • ICN 2023, The Twenty-Second International Conference on Networks
  • ICONS 2023, The Eighteenth International Conference on Systems
  • MMEDIA 2023, The Fifteenth International Conference on Advances in Multimedia
  • PESARO 2023, The Thirteenth International Conference on Performance, Safety and Robustness in Complex Systems and Applications
  • CTRQ 2023, The Sixteenth International Conference on Communication Theory, Reliability, and Quality of Service
  • ALLDATA 2023, The Ninth International Conference on Big Data, Small Data, Linked Data and Open Data
  • SOFTENG 2023, The Ninth International Conference on Advances and Trends in Software Engineering

DigitalWorld 2023 Congress
April 24, 2023 to April 28, 2023 - Venice, Italy

  • ICDS 2023, The Seventeenth International Conference on Digital Society
  • ACHI 2023, The Sixteenth International Conference on Advances in Computer-Human Interactions
  • GEOProcessing 2023, The Fifteenth International Conference on Advanced Geographic Information Systems, Applications, and Services
  • eTELEMED 2023, The Fifteenth International Conference on eHealth, Telemedicine, and Social Medicine
  • eLmL 2023, The Fifteenth International Conference on Mobile, Hybrid, and On-line Learning
  • eKNOW 2023, The Fifteenth International Conference on Information, Process, and Knowledge Management
  • ALLSENSORS 2023, The Eighth International Conference on Advances in Sensors, Actuators, Metering and Sensing
  • SMART ACCESSIBILITY 2023, The Eighth International Conference on Universal Accessibility in the Internet of Things and Smart Environments

DataSys 2023 Congress
June 26, 2023 to June 30, 2023 - Nice, Saint-Laurent-du-Var, France

  • AICT 2023, The Nineteenth Advanced International Conference on Telecommunications
  • ICIW 2023, The Eighteenth International Conference on Internet and Web Applications and Services
  • ICIMP 2023, The Eighteenth International Conference on Internet Monitoring and Protection
  • SMART 2023, The Twelfth International Conference on Smart Cities, Systems, Devices and Technologies
  • IMMM 2023, The Thirteenth International Conference on Advances in Information Mining and Management
  • INFOCOMP 2023, The Thirteenth International Conference on Advanced Communications and Computation
  • MOBILITY 2023, The Thirteenth International Conference on Mobile Services, Resources, and Users
  • SPWID 2023, The Ninth International Conference on Smart Portable, Wearable, Implantable and Disability-oriented Devices and Systems
  • ACCSE 2023, The Eighth International Conference on Advances in Computation, Communications and Services

ComputationWorld 2023 Congress
June 26, 2023 to June 30, 2023 - Nice, Saint-Laurent-du-Var, France

  • SERVICE COMPUTATION 2023, The Fifteenth International Conference on Advanced Service Computing
  • CLOUD COMPUTING 2023, The Fourteenth International Conference on Cloud Computing, GRIDs, and Virtualization
  • FUTURE COMPUTING 2023, The Fifteenth International Conference on Future Computational Technologies and Applications
  • COGNITIVE 2023, The Fifteenth International Conference on Advanced Cognitive Technologies and Applications
  • ADAPTIVE 2023, The Fifteenth International Conference on Adaptive and Self-Adaptive Systems and Applications
  • CONTENT 2023, The Fifteenth International Conference on Creative Content Technologies
  • PATTERNS 2023, The Fifteenth International Conference on Pervasive Patterns and Applications
  • COMPUTATION TOOLS 2023, The Fourteenth International Conference on Computational Logics, Algebras, Programming, Tools, and Benchmarking
  • BUSTECH 2023, The Thirteenth International Conference on Business Intelligence and Technology

NetWare 2023 Congress
September 25, 2023 to September 29, 2023 - Porto, Portugal

  • SENSORCOMM 2023, The Seventeenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2023, The Fourteenth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2023, The Seventeenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2023, The Fifteenth International Conference on Advances in Future Internet
  • CENICS 2023, The Sixteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2023, The Seventeenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2023, The Ninth International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2023, The Eighth International Conference on Green Communications, Computing and Technologies

NexTech 2023 Congress
September 25, 2023 to September 29, 2023 - Porto, Portugal

  • UBICOMM 2023, The Seventeenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2023, The Seventeenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2023, The Seventeenth International Conference on Advances in Semantic Processing
  • AMBIENT 2023, The Thirteenth International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2023, The Fifteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2023, The Twelfth International Conference on Data Analytics
  • GLOBAL HEALTH 2023, The Twelfth International Conference on Global Health Challenges
  • CYBER 2023, The Eighth International Conference on Cyber-Technologies and Cyber-Systems

TrendNews 2023 Congress
September 25, 2023 to September 29, 2023 - Porto, Portugal

  • CORETA 2023, Advances on Core Technologies and Applications
  • DIGITAL 2023, Advances on Societal Digital Transformation

SocSys 2023 Congress
November 13, 2023 to November 17, 2023 - Valencia, Spain

SoftNet 2023 Congress
November 13, 2023 to November 17, 2023 - Valencia, Spain

  • ICSEA 2023, The Eighteenth International Conference on Software Engineering Advances
  • ICSNC 2023, The Eighteenth International Conference on Systems and Networks Communications
  • CENTRIC 2023, The Sixteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2023, The Fifteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2023, The Fifteenth International Conference on Advances in System Simulation
  • SOTICS 2023, The Thirteenth International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2023, The Twelfth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2023, The Eighth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

IARIA Congress 2023, The 2023 IARIA Annual Congress on Frontiers in Science, Technology, Services, and Applications
November 13, 2023 to November 17, 2023 - Valencia, Spain

 

 


ThinkMind // SECURWARE 2014, The Eighth International Conference on Emerging Security Information, Systems and Technologies

Type: conference

Download: SECURWARE 2014 cover page

Download: SECURWARE 2014 foreword page

Download: SECURWARE 2014 committee page

Download: SECURWARE 2014 table of contents

Download: SECURWARE 2014 full proceedings

Notes: IARIA Conference.

Editors:
Rainer Falk, Siemens AG - München, Germany
Carlos Becker Westphall, Federal University of Santa Catarina, Brazil

Event editions: - there are 12 editions.

ISSN: 2162-2116

ISBN: 978-1-61208-376-6

Location: Lisbon, Portugal

Dates: from November 16, 2014 to November 20, 2014

Articles: there are 34 articles

Embedded Web Device Security
Michael Riegler and Johannes Sametinger
keywords: web; embedded devices; web security; industrial control systems.

Design Issues in the Construction of a Cryptographically Secure Instant Message Service for Android Smartphones
Alexandre Braga and Daniela Schwab
keywords: Cryptography; Security; Android; Instant Message.

Resisting Flooding Attacks on AODV
Mohamed A. Abdelshafy and Peter J.B. King
keywords: MANET, Routing, AODV, Security, Attack, Flooding

The Policy-Based AS_PATH Verification to Monitor AS Path Hijacking
Je-Kuk Yun, Beomseok Hong, and Yanggon Kim
keywords: border gateway protocol; interdomain routing; network security; networks; AS path hijacking.

A New Property Coding in Text Steganography of Microsoft Word Documents
Ivan Stojanov, Aleksandra Mileva, and Igor Stojanovic
keywords: Data Hiding; Microsoft Word

Audio Steganograpgy by Phase Modification
Fatiha Djebbar and Beghdad Ayad
keywords: Information hiding; Phase Coding; Steganalysis

Current Issues in Cloud Computing Security and Management
Pedro Artur Figueiredo Vitti, Daniel Ricardo dos Santos, Carlos Becker Westphall, Carla Merkle Westphall, and Kleber Magno Maciel Vieira
keywords: cloud computing; security management; monitoring; security metrics

N-Gram-Based User Behavioral Model for Continuous User Authentication
Leslie Milton, Bryan Robbins, and Atif Memon
keywords: behavioral modeling; continuous authentication; software security; n-grams

GAIA-MLIS: A Maturity Model for Information Security
Roger William Coelho, Gilberto Fernandes Junior, and Mario Lemes Proença Junior
keywords: Maturity Level; Information Security; IT Governance.

Security of Vehicular Networks: Static and Dynamic Control of Cyber-Physical Objects
Vladimir Muliukha, Vladimir Zaborovsky, and Sergey Popov
keywords: Security; Vehicular network; Cyber-physics objects; Dynamic access control; Virtual connections

Digital Signature of Network Segment Using Genetic Algorithm and Ant Colony Optimization Metaheuristics
Paulo R. G. Hernandes Jr., Luiz F. Carvalho, Gilberto Fernandes Jr., and Mario L. Proença Jr.
keywords: Characterization; Traffic Monitoring; Network Management; Genetic Algorithm, sFlow

DeadDrop-in-a-Flash: Information Hiding at SSD NAND Flash Memory Physical Layer
Avinash Srinivasan, Jie Wu, Panneer Santhalingam, and Jeffrey Zamanski
keywords: Anti-forensics; Covert Communication; Information Hiding; Security; Solid State Drives.

Saving Privacy in Trust-Based User-Centric Distributed Systems
Alessandro Aldini
keywords: Cooperation incentives; trust; privacy; remuneration; user-centric networks; model checking.

Enhancing Privacy on Identity Providers
Rafael Weingärtner and Carla Merkle Westphall
keywords: Cloud Computing; Security; Privacy; Federation; Identity providers;

Enforcing Security Policies on Choreographed Services Using Rewriting Techniques
Karim Dahmani and Mahjoub Langar
keywords: Web Service Composition Security; Instrumentation; Choreography; Formal Verification; End-Point Calculus.

Obtaining Strong Identifiers Through Attribute Aggregation
Walter Priesnitz Filho and Carlos Nuno da Cruz Ribeiro
keywords: Privacy; Identity Management Systems; Attribute Aggregation

Wi-Fi Intruder Detection
Rui Fernandes, Tiago Varum, Nuno Matos, and Pedro Pinho
keywords: Wi-Fi; RF Signature; Wavelet Transform; Intruder Detection; RSSI, Security; Wireless.

Adding Secure Deletion to an Encrypted File System on Android Smartphones
Alexandre Braga and Alfredo Colito
keywords: secure delete; secure storage; encrypted file system; flash memory; mobile devices; Android

Performance Impacts in Database Privacy-Preserving Biometric Authentication
Jana Dittmann, Veit Köppen, Christian Krätzer, Martin Leuckert, Gunter Saake, and Claus Vielhauer
keywords: Database Security, Homomorphic Encryption, Privacy, Multi-Computer Scenarios, Database Performance

Data Quality and Security Evaluation Tool for Nanoscale Sensors
Leon Reznik and Sergey Lyshevski
keywords: data quality; computer security evaluation; data accuracy; data fusion.

AndroSAT: Security Analysis Tool for Android Applications
Saurabh Oberoi, Weilong Song, and Amr Youssef
keywords: Android Security; Static Analysis; Dynamic Analysis

Involvers’ Behavior-based Modeling in Cyber Targeted Attack
Youngsoo Kim and Ikkyun Kim
keywords: APT; Targeted Attacks; Behavior-based Modeling; Malicious Codes; 3.20 DarkSeoul

Test Case Generation Assisted by Control Dependence Analysis
Puhan Zhang, Qi Wang, Guowei Dong, Bin Liang, and Wenchang Shi
keywords: test case generation; control dependence; implicit information flow; symbolic execution

Implementation Issues in the Construction of Standard and Non-Standard Cryptography on Android Devices
Alexandre Braga and Eduardo Morais
keywords: Cryptography; Surveillance; Security; Android

Threshold Proxy Signature Based on Position
Qingshui Xue, Fengying Li, and Zhenfu Cao
keywords: position, threshold proxy signature, proxy signature, UC security, model, scheme

Linearity Measures for Multivariate Public Key Cryptography
Simona Samardjiska and Danilo Gligoroski
keywords: Strong (s, t)-linearity; (s, t)-linearity; MinRank; good keys; separation keys.

Managed Certificate Whitelisting - A Basis for Internet of Things Security in Industrial Automation Applications
Rainer Falk and Steffen Fries
keywords: Digital certificate, certificate whitelisting, credential management, PKI, device authentication, Internet of Things

Challenges for Evolving Large-Scale Security Architectures
Geir Køien
keywords: Evolving Security; System Security; Security Architecture; Long-term security planning.

A Backtracking Symbolic Execution Engine with Sound Path Merging
Andreas Ibing
keywords: static analysis, symbolic execution

Security Extensions for Mobile Commerce Objects
Nazri Bin Abdullah, Ioannis Kounelis, and Sead Muftic
keywords: mobile commerce; m–commerce; m-objects; security; privacy

Attack Surface Reduction for Web Services based on Authorization Patterns
Roland Steinegger, Johannes Schäfer, Max Vogler, and Sebastian Abeck
keywords: security pattern, attack surface, authorization, web service, rest

Evaluation of Vehicle Diagnostics Security – Implementation of a Reproducible Security Access
Martin Ring, Tobias Rensen, and Reiner Kriesten
keywords: security access; safety; diagnostics security; data busses; communication standard.

An AMI Threat Detection Mechanism Based on SDN Networks
Po-Wen Chi, Chien-Ting Kuo, He-Ming Ruan, Shih-Jen Chen, and Chin-Laung Lei
keywords: AMI; SDN; Specification-based detection

Ghost Map: Proving Software Correctness using Games
Ronald Watro, Kerry Moffitt, Talib Hussain, Daniel Wyschogrod, John Ostwald, Derrick Kong, Clint Bowers, Eric Church, Joshua Guttman, and Qinsi Wang
keywords: games; static analyses; formal verification; crowd souring; games; model checking

SERVICES CONTACT
2010 - 2022 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.