Table of Contents, vol 9, no 1&2, year 2016

pages: 1 - 13
The All Seeing Eye and Apate: Bridging the Gap between IDS and Honeypots
Christoph Pohl, MuSe - Munich IT Security Research Group, Munich University of Applied Sciences, Germany
Hans-Joachim Hof, MuSe - Munich IT Security Research Group, Munich University of Applied Sciences, Germany

pages: 14 - 24
MoNA: Automated Identification of Evidence in Forensic Short Messages
Michael Spranger, University of Applied Sciences Mittweida, Germany
Florian Heinke, University of Applied Sciences Mittweida, Germany
Luisa Appelt, University of Applied Sciences Mittweida, Germany
Marcus Puder, University of Applied Sciences Mittweida, Germany
Dirk Labudde, University of Applied Sciences Mittweida, Germany

pages: 25 - 35
Secure Scrum and OpenSAMM for Secure Software Development
Christoph Pohl, MuSe - Munich IT Security Research Group, Munich University of Applied Sciences, Germany
Hans-Joachim Hof, MuSe - Munich IT Security Research Group, Munich University of Applied Sciences, Germany

pages: 36 - 48
Securing Card data on the Cloud: Application of the Cloud Card Compliance Checklist
Hassan El Alloussi, Faculty of Sciences Aïn Chock, Hassan II University of Casablanca, Morocco
Laila Fetjah, Faculty of Sciences Aïn Chock, Hassan II University of Casablanca, Morocco
Abdelhak Chaichaa, Faculty of Sciences Aïn Chock, Hassan II University of Casablanca, Morocco

pages: 49 - 58
New Applications of Physical Unclonable Functions
Rainer Falk, Siemens AG, Corporate Technology, Germany
Steffen Fries, Siemens AG, Corporate Technology, Germany

pages: 59 - 65
Implementation and Evaluation of Intrinsic Authentication in Quantum Key Distribution Protocols
Stefan Rass, Universitaet Klagenfurt, Institute of Applied Informatics, System Security Group, Austria
Sandra König, Austrian Institute of Technology, Digital Safety & Security Department, Austria
Stefan Schauer, Austrian Institute of Technology, Digital Safety & Security Department, Austria
Oliver Maurhart, Austrian Institute of Technology, Digital Safety & Security Department, Austria

pages: 66 - 79
Practical Use Case Evaluation of a Generic ICT Meta-Risk Model Implemented with Graph Database Technology
Stefan Schiebeck, AIT Austrian Institute of Technology GmbH, Austria
Martin Latzenhofer, AIT Austrian Institute of Technology GmbH, Austria
Brigitte Palensky, AIT Austrian Institute of Technology GmbH, Austria
Stefan Schauer, AIT Austrian Institute of Technology GmbH, Austria
Gerald Quirchmayr, Faculty of Computer Science, University of Vienna, Austria
Thomas Benesch, s-benesch, Austria
Johannes Göllner, National Defence Academy of the Austrian Federal Ministry of Defence and Sports, Austria
Christian Meurers, National Defence Academy of the Austrian Federal Ministry of Defence and Sports, Austria
Ingo Mayr, National Defence Academy of the Austrian Federal Ministry of Defence and Sports, Austria

pages: 80 - 89
Secure Vehicle-to-Infrastructure Communication: Secure Roadside Stations, Key Management, and Crypto Agility
Markus Ullmann, BSI & University of Applied Sciences Bonn-Rhine-Sieg, Germany
Christian Wieschebrink, BSI, Germany
Thomas Strubbe, BSI, Germany
Dennis Kuegler, BSI, Germany

download vol 9, no 1&2, year 2016

 
Copyright (c) 2008-2010. IARIA, All rights reserved.