Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_18
Yosra Ben Mustapha, Hervé Debar, G. Jacob
{"title":"Limitation of Honeypot/Honeynet Databases to Enhance Alert Correlation","authors":"Yosra Ben Mustapha, Hervé Debar, G. Jacob","doi":"10.1007/978-3-642-33704-8_18","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_18","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124816033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_14
G. G. Granadillo, Hervé Debar, G. Jacob, Chrystel Gaber, Mohammed Achemlal
{"title":"Individual Countermeasure Selection Based on the Return On Response Investment Index","authors":"G. G. Granadillo, Hervé Debar, G. Jacob, Chrystel Gaber, Mohammed Achemlal","doi":"10.1007/978-3-642-33704-8_14","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_14","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126366815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_5
V. Yakovlev, V. Korzhik, M. Bakaev, G. Morales-Luna
{"title":"Optimization of Key Distribution Protocols Based on Extractors for Noisy Channels within Active Adversaries","authors":"V. Yakovlev, V. Korzhik, M. Bakaev, G. Morales-Luna","doi":"10.1007/978-3-642-33704-8_5","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_5","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131155140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_1
B. Livshits
{"title":"Finding Malware on a Web Scale","authors":"B. Livshits","doi":"10.1007/978-3-642-33704-8_1","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_1","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134509588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_7
A. Moldovyan, N. Moldovyan, Evgenia Novikova
{"title":"Blind 384-bit Digital Signature Scheme","authors":"A. Moldovyan, N. Moldovyan, Evgenia Novikova","doi":"10.1007/978-3-642-33704-8_7","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_7","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129270376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_21
G. Dini, F. Martinelli, A. Saracino, D. Sgandurra
{"title":"MADAM: A Multi-level Anomaly Detector for Android Malware","authors":"G. Dini, F. Martinelli, A. Saracino, D. Sgandurra","doi":"10.1007/978-3-642-33704-8_21","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_21","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125613756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_8
Xin Jin, R. Sandhu, R. Krishnan
{"title":"RABAC: Role-Centric Attribute-Based Access Control","authors":"Xin Jin, R. Sandhu, R. Krishnan","doi":"10.1007/978-3-642-33704-8_8","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_8","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134403731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_12
T. Avanesov, Yannick Chevalier, M. Rusinowitch, Mathieu Turuani
{"title":"Towards the Orchestration of Secured Services under Non-disclosure Policies","authors":"T. Avanesov, Yannick Chevalier, M. Rusinowitch, Mathieu Turuani","doi":"10.1007/978-3-642-33704-8_12","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_12","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116900554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_15
R. Rieke, L. Coppolino, A. Hutchison, Elsa Prieto, Chrystel Gaber
{"title":"Security and Reliability Requirements for Advanced Security Event Management","authors":"R. Rieke, L. Coppolino, A. Hutchison, Elsa Prieto, Chrystel Gaber","doi":"10.1007/978-3-642-33704-8_15","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_15","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115481483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-10-17DOI: 10.1007/978-3-642-33704-8_13
A. Chechulin, Igor Kotenko, V. Desnitsky
{"title":"An Approach for Network Information Flow Analysis for Systems of Embedded Components","authors":"A. Chechulin, Igor Kotenko, V. Desnitsky","doi":"10.1007/978-3-642-33704-8_13","DOIUrl":"https://doi.org/10.1007/978-3-642-33704-8_13","url":null,"abstract":"","PeriodicalId":253646,"journal":{"name":"Mathematical Methods, Models, and Architectures for Network Security Systems","volume":"144 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122583100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}