Table of Contents, vol 9, no 3&4, year 2016

pages: 90 - 100
On the Resilience of a QKD Key Synchronization Protocol for IPsec
Stefan Marksteiner, JOANNEUM RESEARCH, Austria
Benjamin Rainer, University of Klagenfurt, Austria
Oliver Maurhart, AIT Austrian Institute of Technology GmbH, Austria

pages: 101 - 110
Prospects of Software-Defined Networking in Industrial Operations
György Kálmán, Norwegian University of Science and Technology, Norway

pages: 111 - 121
Fuzzbomb: Fully-Autonomous Detection and Repair of Cyber Vulnerabilities
David J. Musliner, Smart Information Flow Technologies (SIFT), USA
Scott E. Friedman, Smart Information Flow Technologies (SIFT), USA
Michael Boldt, Smart Information Flow Technologies (SIFT), USA
J. Benton, Smart Information Flow Technologies (SIFT), USA
Max Schuchard, Smart Information Flow Technologies (SIFT), USA
Peter Keller, Smart Information Flow Technologies (SIFT), USA
Stephen McCamant, University of Minnesota, USA

pages: 122 - 132
A Risk Assessment of Logical Attacks on a CEN/XFS-based ATM Platform
Johannes Braeuer, Dept. of Information Systems, Johannes Kepler University Linz, Austria
Bernadette Gmeiner, KEBA AG, Austria
Johannes Sametinger, Dept. of Information Systems, Johannes Kepler University Linz, Austria

pages: 133 - 145
Stabilizing Breach-Free Sensor Barriers
Jorge Cobb, The University of Texas at Dallas, U.S.A.
Chin-Tser Huang, University of South Carolina at Columbia, U.S.A.

pages: 146 - 157
Data Security Overview for Medical Mobile Apps Assuring the Confidentiality, Integrity and Availability of data in transmission
Ceara Treacy, Dundalk Institute of Technology, Ireland
Fergal McCaffery, Dundalk Institute of Technology, Ireland

pages: 158 - 168
Multi-Platform Performance Evaluation of the TUAK Mobile Authentication Algorithm
Keith Mayes, Information Security Group, Royal Holloway, University of London, UK
Stephen Babbage, Vodafone Group R&D, Vodafone Group Services Ltd., UK
Alexander Maximov, Ericsson Research, Ericsson, Sweden

pages: 169 - 183
Cloud Cyber-Security: Empowering the Audit Trail
Bob Duncan, University of Aberdeen, United Kingdom
Mark Whittington, University of Aberdeen, United Kingdom

pages: 184 - 195
Collaborative and Secure Sharing of Healthcare Records Using Attribute-Based Authenticated Access
Mohamed Abomhara, University of Agder, Norway
Huihui Yang, Norwegian University of Science and Technology, Norway

pages: 196 - 206
Detecting Obfuscated JavaScripts from Known and Unknown Obfuscators using Machine Learning
Bernhard Tellenbach, Zurich University of Applied Sciences, Switzerland
Sergio Paganoni, SecureSafe / DSwiss AG, Switzerland
Marc Rennhard, Zurich University of Applied Sciences, Switzerland

download vol 9, no 3&4, year 2016

 
Copyright (c) 2008-2010. IARIA, All rights reserved.