2011 Annual Computer Security Applications Conference
Posters
- An Approach to manage Policy Heterogeneity in Cloud Computing Environment
- Hassan Takabi and James Joshi
University of Pittsburgh
- AuctionHero: a game to model security in context
- Sonia Chiasson, Manas Modi, and Robert Biddle
Carleton University; Indian Institute of Technology
- Augent: Anonymous Authentication through Authentication Routers
- Peng Zhou, Xiapu Luo, and Rocky K. C. Chang
Department of Computing, The Hong Kong Polytechnic University
- DNS TTL Values as Potent Allies of DDoS Attackers: A Fact Overlooked by Some Major US and EU Banks
- N. Vlajic and U. T. Nguyen
Department of Computer Science and Engineering, York University; The Citizen Lab, Munk School of Global Affairs, University of Toronto
- Efficient Browser Identification with JavaScript Engine Fingerprinting
- Philipp Reschl, Martin Mulazzani, Markus Huber, and Edgar Weippl
SBA-Research - Vienna, Austria
- The Monitoring Core (M-Core): Toward Fully Securing Heterogeneous Wireless Sensor Networks
- Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Yingshu Li, and Raheem Beyah
Department of Computer Science, Georgia State University; GT CAP Group, The School of ECE Georgia Institute of Technology
- Planning Attack Graphs
- Charles F. Bevan and R. Michael Young
NC State University
- User-Choice Patterns in PassTiles Graphical Passwords
- Elizabeth Stobert, Sonia Chiasson, and Robert Biddle
Carleton University
- Virtualization Based Security Framework (vBASE)
- Srujan D. Kotikela, Satyajeet Nimgaonkar, and Mahadevan Gomathisankaran
Computer Science and Engineering, University of North Texas