Network and System Security

7th International Conference, NSS 2013, Madrid, Spain, June 3-4, 2013. Proceedings

Editors:

ISBN: 978-3-642-38630-5 (Print) 978-3-642-38631-2 (Online)

Table of contents (71 chapters)

previous Page of 4
  1. Front Matter

    Pages -

  2. NSS 2013 Regular Papers

    1. System Security: Malware and Intrusions

      1. No Access

        Book Chapter

        Pages 178-191

        MADS: Malicious Android Applications Detection through String Analysis

      2. No Access

        Book Chapter

        Pages 192-205

        X-TIER: Kernel Module Injection

      3. No Access

        Book Chapter

        Pages 206-219

        Leveraging String Kernels for Malware Detection

      4. No Access

        Book Chapter

        Pages 220-235

        Insiders Trapped in the Mirror Reveal Themselves in Social Media

      System Security: Applications Security

      1. No Access

        Book Chapter

        Pages 236-249

        On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework

      2. No Access

        Book Chapter

        Pages 250-263

        Using the Smart Card Web Server in Secure Branchless Banking

      3. No Access

        Book Chapter

        Pages 264-277

        Liability for Data Breaches: A Proposal for a Revenue-Based Sanctioning Approach

      Network Security: Modeling and Evaluation

      1. No Access

        Book Chapter

        Pages 1-13

        Stochastic Traffic Identification for Security Management: eDonkey Protocol as a Case Study

      2. No Access

        Book Chapter

        Pages 14-25

        A Technology Independent Security Gateway for Real-Time Multimedia Communication

      3. No Access

        Book Chapter

        Pages 26-39

        Efficient Attribute Based Access Control Mechanism for Vehicular Ad Hoc Network

      4. No Access

        Book Chapter

        Pages 40-53

        Evaluation of Detecting Malicious Nodes Using Bayesian Model in Wireless Intrusion Detection

      5. No Access

        Book Chapter

        Pages 54-67

        Model the Influence of Sybil Nodes in P2P Botnets

      Network Security: Security Protocols and Practice

      1. No Access

        Book Chapter

        Pages 68-79

        A Novel Security Protocol for Resolving Addresses in the Location/ID Split Architecture

      2. No Access

        Book Chapter

        Pages 80-93

        The OffPAD: Requirements and Usage

      3. No Access

        Book Chapter

        Pages 94-108

        Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks

      4. No Access

        Book Chapter

        Pages 109-121

        Using Trusted Platform Modules for Location Assurance in Cloud Networking

      Network Security: Network Attacks and Defense

      1. No Access

        Book Chapter

        Pages 122-134

        Tracing Sources of Anonymous Slow Suspicious Activities

      2. No Access

        Book Chapter

        Pages 135-148

        Static Analysis for Regular Expression Denial-of-Service Attacks

      3. No Access

        Book Chapter

        Pages 149-163

        Next-Generation DoS at the Higher Layers: A Study of SMTP Flooding

      4. No Access

        Book Chapter

        Pages 164-177

        Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning

previous Page of 4