Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_19
D. Zegzhda, T. Stepanova
{"title":"Stochastic Model of Interaction between Botnets and Distributed Computer Defense Systems","authors":"D. Zegzhda, T. Stepanova","doi":"10.1007/978-3-642-33704-8_19","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_19","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132748442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_6
Joe-Kai Tsay, S. F. Mjølsnes
{"title":"A Vulnerability in the UMTS and LTE Authentication and Key Agreement Protocols","authors":"Joe-Kai Tsay, S. F. Mjølsnes","doi":"10.1007/978-3-642-33704-8_6","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_6","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115084271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_17
A. Dolgikh, Tomas Nykodym, V. Skormin, Zachary Birnbaum
{"title":"Using Behavioral Modeling and Customized Normalcy Profiles as Protection against Targeted Cyber-Attacks","authors":"A. Dolgikh, Tomas Nykodym, V. Skormin, Zachary Birnbaum","doi":"10.1007/978-3-642-33704-8_17","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_17","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114595506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_22
Dmitriy Komashinskiy, Igor Kotenko
{"title":"Using Low-Level Dynamic Attributes for Malware Detection Based on Data Mining Methods","authors":"Dmitriy Komashinskiy, Igor Kotenko","doi":"10.1007/978-3-642-33704-8_22","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_22","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130136491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_11
Josée Desharnais, Erwanne P. Kanyabwero, N. Tawbi
{"title":"Enforcing Information Flow Policies by a Three-Valued Analysis","authors":"Josée Desharnais, Erwanne P. Kanyabwero, N. Tawbi","doi":"10.1007/978-3-642-33704-8_11","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_11","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123808514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_23
V. Desnitsky, Igor Kotenko, A. Chechulin
{"title":"Configuration-Based Approach to Embedded Device Security","authors":"V. Desnitsky, Igor Kotenko, A. Chechulin","doi":"10.1007/978-3-642-33704-8_23","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_23","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129862116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_20
Chaitanya Yavvari, A. Tokhtabayev, H. Rangwala, A. Stavrou
{"title":"Malware Characterization Using Behavioral Components","authors":"Chaitanya Yavvari, A. Tokhtabayev, H. Rangwala, A. Stavrou","doi":"10.1007/978-3-642-33704-8_20","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_20","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128866223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_2
Zhaohui Wang, Ryan V. Johnson, Rahul Murmuria, A. Stavrou
{"title":"Exposing Security Risks for Commercial Mobile Devices","authors":"Zhaohui Wang, Ryan V. Johnson, Rahul Murmuria, A. Stavrou","doi":"10.1007/978-3-642-33704-8_2","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_2","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"177 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114846140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_10
A. Grusho, N. A. Grusho, E. Timonina
{"title":"Alternative Mechanisms for Information Security","authors":"A. Grusho, N. A. Grusho, E. Timonina","doi":"10.1007/978-3-642-33704-8_10","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_10","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"9 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131839810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_3
F. Martinelli, I. Matteucci, C. Morisset
{"title":"From Qualitative to Quantitative Enforcement of Security Policy","authors":"F. Martinelli, I. Matteucci, C. Morisset","doi":"10.1007/978-3-642-33704-8_3","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_3","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133144391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}