|
Network Intrusion Detection |
|
|
|
Designing Scalable and Effective Decision Support for Mitigating Attacks in Large Enterprise Networks |
|
|
1 | (18) |
|
|
|
|
|
An On-Line Learning Statistical Model to Detect Malicious Web Requests |
|
|
19 | (20) |
|
|
|
|
|
Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems |
|
|
39 | (20) |
|
|
|
|
Anonymity and Privacy (I) |
|
|
|
K2C: Cryptographic Cloud Storage with Lazy Revocation and Anonymous Access |
|
|
59 | (18) |
|
|
|
|
Analyzing the Gold Star Scheme in a Split Tor Network |
|
|
77 | (19) |
|
|
|
|
Location Privacy and Attacker Knowledge: Who Are We Fighting against? |
|
|
96 | (20) |
|
|
|
|
Insecurity in Public-Safety Communications: APCO Project 25 |
|
|
116 | (18) |
|
|
Vallipuram Muthukkumarasamy |
|
|
|
|
Behavioral Mimicry Covert Communication |
|
|
134 | (20) |
|
|
|
Defense against Spectrum Sensing Data Falsification Attacks in Cognitive Radio Networks |
|
|
154 | (18) |
|
|
|
|
|
|
On Detection of Erratic Arguments |
|
|
172 | (18) |
|
|
|
|
|
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits |
|
|
190 | (19) |
|
|
|
|
|
Time-Traveling Forensic Analysis of VM-Based High-Interaction Honeypots |
|
|
209 | (18) |
|
|
|
Anonymity and Privacy (II) |
|
|
|
Optimistic Fair Exchange of Ring Signatures |
|
|
227 | (16) |
|
|
|
|
Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards |
|
|
243 | (18) |
|
|
|
Multi-party Private Web Search with Untrusted Partners |
|
|
261 | (20) |
|
|
|
|
|
|
υ-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks |
|
|
281 | (22) |
|
|
|
Delay Fast Packets (DFP): Prevention of DNS Cache Poisoning |
|
|
303 | (16) |
|
|
|
|
|
Unilateral Antidotes to DNS Poisoning |
|
|
319 | (18) |
|
|
|
|
|
Security Analysis of Leap-of-Faith Protocols |
|
|
337 | (19) |
|
|
|
Secure and Practical Key Distribution for RFID-Enabled Supply Chains |
|
|
356 | (17) |
|
|
|
|
Towards a Deterministic Hierarchical Key Predistribution for WSN Using Complementary Fano Plane |
|
|
373 | (16) |
|
|
|
|
|
|
Context-Related Access Control for Mobile Caching |
|
|
389 | (20) |
|
|
|
|
|
|
Anonymity for Key-Trees with Adaptive Adversaries |
|
|
409 | (17) |
|
|
|
|
|
Analyzing the Hardware Costs of Different Security-Layer Variants for a Low-Cost RFID Tag |
|
|
426 | (10) |
|
|
|
Preventing Secret Data Leakage from Foreign Mappings in Virtual Machines |
|
|
436 | (10) |
|
|
|
|
|
|
Winning with DNS Failures: Strategies for Faster Botnet Detection |
|
|
446 | (14) |
|
|
|
Trading Elephants for Ants: Efficient Post-attack Reconstitution |
|
|
460 | (10) |
|
|
|
|
|
|
|
Privacy-Preserving Online Mixing of High Integrity Mobile Multi-user Data |
|
|
470 | (10) |
|
|
|
|
Symbolic Analysis for Security of Roaming Protocols in Mobile Networks (Extended Abstract) |
|
|
480 | (11) |
|
|
|
|
CloudSeal: End-to-End Content Protection in Cloud-Based Storage and Delivery Services |
|
|
491 | (10) |
|
|
|
|
|
Call Behavioral Analysis to Thwart SPIT Attacks on VoIP Networks |
|
|
501 | (10) |
|
|
|
|
T-CUP: A TPM-Based Code Update Protocol Enabling Attestations for Sensor Networks |
|
|
511 | (11) |
|
|
|
|
Build and Test Your Own Network Configuration |
|
|
522 | (11) |
|
|
|
|
PP2db: A Privacy-Preserving, P2P-Based Scalable Storage System for Mobile Networks |
|
|
533 | (10) |
|
|
|
|
|
|
NetFlow Based Network Protection |
|
|
543 | (4) |
|
|
Author Index |
|
547 | |