Full Program »
Reception and Poster Session
Thursday, 6 December 2012
18:15 - 21:00
20Seven
A credible cost-sensitive model for intrusion response selection
Aderonke J., Ikuomola and Adesina S., Sodiya
Department of Computer Science, University of Agriculture Abeokuta Ogun State, Nigeria
FIREAXE: Forging Impervious and Resilient Entities for Adversarial Execution Environments
Will Atkins and Yevgeniy "Eugene" Vorobeychik
The Center for Cyber Defenders
HAS Analysis: Detecting HTTP-based C&Cs based on the Analysis of HTTP Activity Sets
Sungjin Kim, Yujeong Han, Jaesung Lee, Younghan Choi, Byungchul Bae, Hyunggeun Oh, and Kiwook Sohn
The Attached Institute of ETRI, Daejeon, Korea
Linking Cybersecurity Knowledge: Cybersecurity Informatino Discovery Mechanism
Takeshi Takahashi, Youki Kadobayashi, and Yuuki Takano
National Institute of Information and Communications Technology, Tokyo, Japan
NDN Interest Flooding Attacks and Countermeasures
Alberto Compagno, Mauro Conti, Paolo Gasti, and Gene Tsudik
University of Padua, Italy; New York Institute of Technology, USA; University of California, Irvine, USA
PUSH IDENTITY; Usable Single Sign-on
Kyohei Furukawa and Manabu Okamoto
Kanagawa Institute of Technology, Japan
Policy Management in Cloud Computing Environments
Hassan Takabi and James B. D. Joshi
School of Information Sciences, University of Pittsburgh
Robust and Effective Feature Selection for Opinion Spam Detection
Rakesh Verma and Ekene Sibeudu
University of Houston, USA; University of Maryland Baltimore, USA
Role Based Access Control For Android
Felix Rohrer, Yuting Zhang, Lou Chitkushev, and Tanya Zlateva
Computer Science Department, Metropolitan College, Boston University, USA
Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
Yuhong Liu, Yan (Lindsay) Sun, Siyuan Liu, and Alex C. Kot
Department of Electrical and Computer Engineering University of Rhode Island, USA; School of Electrical and Electrinic Engineering, Nanyang Technological University, Singapore
Teaching Security with Interactive Exercises
Richard Weiss and Jens Mache
The Evergreen State College, USA; Lewis & Clark College, USA
Toward Unobservable Data Sharing in Overlay Networks
Qingfeng Tan, Jinqiao Shi, Xiaojun Chen, Fanwen Xu, and Shoufeng Cao
Chinese National Engineering laboratory for Information Security Technologies; Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; Department of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China; National Computer Network Emergency Persons Technical Team/Coordination Center of China