Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Albert Sitek, Zbigniew Kotulski |
Cardholder's Reputation System for Contextual Risk Management in Payment Transactions. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexander Branitskiy, Igor V. Kotenko |
Network Anomaly Detection Based on an Ensemble of Adaptive Binary Classifiers. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Maxim Kolomeec, Gustavo Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor V. Kotenko, Hervé Debar |
Choosing Models for Security Metrics Visualization. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Nanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho |
Towards Self-aware Approach for Mobile Devices Security. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Steven Drager 0001, Janusz Zalewski |
A Novel and Unifying View of Trustworthiness in Cyberphysical Systems. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Laurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens |
Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical Systems. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Evgenia Novikova, Ivan Murenin |
Visualization-Driven Approach to Anomaly Detection in the Movement of Critical Infrastructure. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Qi Dong, Zekun Yang, Yu Chen 0002, Xiaohua Li, Kai Zeng 0001 |
Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum Analysis. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | An Braeken, Sergey Bezzateev, Abdellah Touhafi, Natalia Voloshina |
HEPPA: Highly Efficient Privacy Preserving Authentication for ITS. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Marcin Niemiec, Maciej Francikiewicz |
Security Assessment of Cryptographic Algorithms. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Omar Iraqi, Hanan El Bakkali |
Toward Third-Party Immune Applications. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Emrah Korkmaz, Matthew Davis, Andrey M. Dolgikh, Victor A. Skormin |
Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCs. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Janusz Górski, Katarzyna Lukasiewicz |
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jacek Rak, John Bay, Igor V. Kotenko, Leonard J. Popyack, Victor A. Skormin, Krzysztof Szczypiorski (eds.) |
Computer Network Security - 7th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2017, Warsaw, Poland, August 28-30, 2017, Proceedings |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anton Kopeikin, Arnur G. Tokhtabayev, Nurlan Tashatov, Dina Satybaldina |
tLab: A System Enabling Malware Clustering Based on Suspicious Activity Trees. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vasileios Gkioulos, Stephen D. Wolthusen |
Security Requirements for the Deployment of Services Across Tactical SOA. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Leonard J. Popyack, Jay Biernat |
Race Condition Faults in Multi-core Systems. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Metere, Changyu Dong |
Automated Cryptographic Analysis of the Pedersen Commitment Scheme. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Davis, Emrah Korkmaz, Andrey M. Dolgikh, Victor A. Skormin |
Resident Security System for Government/Industry Owned Computers. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexander A. Grusho, Nick A. Grusho, Michael I. Zabezhailo, Alexander Zatsarinny, Elena E. Timonina |
Information Security of SDN on the Basis of Meta Data. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Alexander A. Grusho |
Data Mining and Information Security. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jerzy Konorski, Karol Rydzewski |
Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation System. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hubert Ostap, Ryszard Antkiewicz |
A Concept of Clustering-Based Method for Botnet Detection. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Stig Fr. Mjølsnes, Ruxandra F. Olimid |
Easy 4G/LTE IMSI Catchers for Non-Programmers. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Hutchison |
Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking Models. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Arnur G. Tokhtabayev, Anton Kopeikin, Nurlan Tashatov, Dina Satybaldina |
Malware Analysis and Detection via Activity Trees in User-Dependent Environment. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Valery I. Korzhik, Ivan Fedyanin, Artur Godlewski, Guillermo Morales-Luna |
Steganalysis Based on Statistical Properties of the Encrypted Messages. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Vasileios Mavroeidis, Mathew Nicho |
Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code Attacks. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Deeraj Nagothu, Andrey M. Dolgikh |
iCrawl: A Visual High Interaction Web Crawler. |
MMM-ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gustavo Gonzalez Granadillo, Hervé Debar, Grégoire Jacob, Chrystel Gaber, Mohammed Achemlal |
Individual Countermeasure Selection Based on the Return On Response Investment Index. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry P. Zegzhda, Tatiana V. Stepanova |
Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Artem S. Konoplev |
Security Modeling of Grid Systems Using Petri Nets. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Livshits |
Finding Malware on a Web Scale. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Josée Desharnais, Erwanne P. Kanyabwero, Nadia Tawbi |
Enforcing Information Flow Policies by a Three-Valued Analysis. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Brendan Kerrigan, Yu Chen 0002 |
A Study of Entropy Sources in Cloud Computers: Random Number Generation on Cloud Hosts. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Joe-Kai Tsay, Stig Fr. Mjølsnes |
A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Julian Schütte, Roland Rieke, Timo Winkelvos |
Model-Based Security Event Management. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra |
MADAM: A Multi-level Anomaly Detector for Android Malware. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yosra Ben Mustapha, Hervé Debar, Grégoire Jacob |
Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vasily Desnitsky, Igor V. Kotenko, Andrey Chechulin |
Configuration-Based Approach to Embedded Device Security. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Viktor Yakovlev, Valery I. Korzhik, Mihail Bakaev, Guillermo Morales-Luna |
Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Roland Rieke, Luigi Coppolino, Andrew Hutchison, Elsa Prieto, Chrystel Gaber |
Security and Reliability Requirements for Advanced Security Event Management. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir A. Oleshchuk |
Trust-Aware RBAC. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tyrone Cadenhead, Murat Kantarcioglu, Vaibhav Khadilkar, Bhavani Thuraisingham |
Design and Implementation of a Cloud-Based Assured Information Sharing System. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Ilaria Matteucci, Charles Morisset |
From Qualitative to Quantitative Enforcement of Security Policy. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Chaitanya Yavvari, Arnur G. Tokhtabayev, Huzefa Rangwala, Angelos Stavrou |
Malware Characterization Using Behavioral Components. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Zhaohui Wang, Ryan Johnson 0002, Rahul Murmuria, Angelos Stavrou |
Exposing Security Risks for Commercial Mobile Devices. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani |
Towards the Orchestration of Secured Services under Non-disclosure Policies. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alexander A. Moldovyan, Nikolay A. Moldovyan, Evgenia Novikova |
Blind 384-bit Digital Signature Scheme. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter D. Zegzhda, Dmitry P. Zegzhda, Alexey V. Nikolskiy |
Using Graph Theory for Cloud System Security Modeling. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andrey M. Dolgikh, Tomas Nykodym, Victor A. Skormin, Zachary Birnbaum |
Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Igor V. Kotenko, Victor A. Skormin (eds.) |
Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xin Jin, Ravi S. Sandhu, Ram Krishnan |
RABAC: Role-Centric Attribute-Based Access Control. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Alexander A. Grusho, Nikolai A. Grusho, Elena E. Timonina |
Alternative Mechanisms for Information Security. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Chechulin, Igor V. Kotenko, Vasily Desnitsky |
An Approach for Network Information Flow Analysis for Systems of Embedded Components. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Dmitriy Komashinskiy, Igor V. Kotenko |
Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods. |
MMM-ACNS |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter Teufl, Udo Payer, Guenther Lackner |
From NLP (Natural Language Processing) to MLP (Machine Language Processing). |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vasily Desnitsky, Igor V. Kotenko |
Security and Scalability of Remote Entrusting Protection. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shiu-Kai Chin, Sarah Muccio, Susan Older, Thomas N. J. Vestal |
Policy-Based Design and Verification for Mission Assurance. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Roland Rieke, Zaharina Stoynova |
Predictive Security Analysis for Event-Driven Processes. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitriy N. Moldovyan, Nikolay A. Moldovyan |
A New Hard Problem over Non-commutative Finite Groups for Cryptographic Protocols. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry P. Zegzhda, Peter D. Zegzhda, Maxim O. Kalinin |
Clarifying Integrity Control at the Trusted Information Environment. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wojciech Molisz, Jacek Rak |
A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Leonid Domnitser, Nael B. Abu-Ghazaleh, Dmitry Ponomarev 0001 |
A Predictive Model for Cache-Based Side Channels in Multicore and Multithreaded Microprocessors. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel |
Cryptography for Network Security: Failures, Successes and Challenges. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yaroslav A. Markov, Maxim O. Kalinin |
Intellectual Intrusion Detection with Sequences Alignment Methods. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Glenn S. Benson, Shiu-Kai Chin, Sean Croston, Karthick Jayaraman, Susan Older |
Credentials Management for High-Value Transactions. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dieter Gollmann |
Secure Applications without Secure Infrastructures. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Igor Saenko 0001, Igor V. Kotenko |
Genetic Optimization of Access Control Schemes in Virtual Local Area Networks. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Muñoz 0001, Antonio Maña, Pablo Antón |
In the Track of the Agent Protection: A Solution Based on Cryptographic Hardware. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Raphaël Khoury, Nadia Tawbi |
Using Equivalence Relations for Corrective Enforcement of Security Policies. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hervé Debar, Nizar Kheir, Nora Cuppens-Boulahia, Frédéric Cuppens |
Service Dependencies in Information Systems Security. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jose Andre Morales, Erhan J. Kartaltepe, Shouhuai Xu, Ravi S. Sandhu |
Symptoms-Based Detection of Bot Processes. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Ram Krishnan, Jianwei Niu 0001, William H. Winsborough |
Group-Centric Models for Secure and Agile Information Sharing. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alexander A. Grusho, Nikolai A. Grusho, Elena E. Timonina |
Problems of Modeling in the Analysis of Covert Channels. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Greg Morrisett |
Integrating Types and Specifications for Secure Software Development. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Krzysztof Sacha |
Credential Chain Discovery in RTT Trust Management Language. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya, Kevin A. Kwiat |
QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ludovic Piètre-Cambacédès, Marc Bouissou |
Attack and Defense Modeling with BDMP. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Kraxberger, Peter Danner, Daniel M. Hein |
Secure Multi-Agent System for Multi-Hop Environments. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry P. Zegzhda, Ekaterina Rudina |
Virtual Environment Security Modeling. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hai Thanh Nguyen 0001, Slobodan Petrovic, Katrin Franke |
A Comparison of Feature-Selection Methods for Intrusion Detection. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Igor V. Kotenko, Victor A. Skormin (eds.) |
Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Devrim Unal, Ozan Akar, M. Ufuk Çaglayan |
Model Checking of Location and Mobility Related Security Policy Specifications in Ambient Calculus. |
MMM-ACNS |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Soon Seok Kim, Sang-Soo Yeo, Hong-Jin Park, Sung Kwon Kim |
A New Scheme for the Location Information Protection in Mobile Communication Environments. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Félix J. García Clemente, Jesús D. Jiménez Re, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta |
Policy-Driven Routing Management Using CIM. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jacques Demerjian, Ibrahim Hajjeh, Mohamad Badra, Salim Ferraz |
A Secure Way to Combine IPsec, NAT & DHCP. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zhouyi Zhou, Bin Liang, Li Jiang, Wenchang Shi, Yeping He |
A Formal Description of SECIMOS Operating System. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Martin Schaffer, Peter Schartner |
Key Escrow with Tree-Based Access Structure. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Vladimir Gorodetsky, Igor V. Kotenko, Victor A. Skormin (eds.) |
Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Artem Tishkov, Igor V. Kotenko, Ekaterina Sidelnikova |
Security Checker Architecture for Policy-Based Security Management. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Dmitry P. Zegzhda, Alex M. Vovk |
Secure Hybrid Operating System "Linux over Fenix". |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ming-Yuh Huang |
Critical Information Assurance Challenges for Modern Large-Scale Infrastructures. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Constantine Daicos, Scott Knight |
A Passive External Web Surveillance Technique for Private Networks. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Duncan A. Buell |
Calibrating Entropy Functions Applied to Computer Networks. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Bill Tsoumas, Stelios Dritsas, Dimitris Gritzalis |
An Ontology-Based Approach to Information Systems Security Management. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
IS Security, Security Policy, Security Management, Security Ontology |
1 | Alexei Galatenko, Alexander A. Grusho, Alexander Kniazev, Elena E. Timonina |
Statistical Covert Channels Through PROXY Server. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mikhail I. Smirnov |
Trust by Workflow in Autonomic Communication. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Peter Schartner, Martin Schaffer |
Unique User-Generated Digital Pseudonyms. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David M. Nicol, Michael Liljenstam |
Models and Analysis of Active Worm Defense. |
MMM-ACNS |
2005 |
DBLP DOI BibTeX RDF |
|