An Approach to manage Policy Heterogeneity in Cloud Computing Environment
Hassan Takabi and James Joshi
University of Pittsburgh
AuctionHero: a game to model security in context
Sonia Chiasson, Manas Modi, and Robert Biddle
Carleton University; Indian Institute of Technology
Augent: Anonymous Authentication through Authentication Routers
Peng Zhou, Xiapu Luo, and Rocky K. C. Chang
Department of Computing, The Hong Kong Polytechnic University
DNS TTL Values as Potent Allies of DDoS Attackers: A Fact Overlooked by Some Major US and EU Banks
N. Vlajic and U. T. Nguyen
Department of Computer Science and Engineering, York University; The Citizen Lab, Munk School of Global Affairs, University of Toronto
Efficient Browser Identification with JavaScript Engine Fingerprinting
Philipp Reschl, Martin Mulazzani, Markus Huber, and Edgar Weippl
SBA-Research - Vienna, Austria
The Monitoring Core (M-Core): Toward Fully Securing Heterogeneous Wireless Sensor Networks
Marco Valero, Sang Shin Jung, A. Selcuk Uluagac, Yingshu Li, and Raheem Beyah
Department of Computer Science, Georgia State University; GT CAP Group, The School of ECE Georgia Institute of Technology
Planning Attack Graphs
Charles F. Bevan and R. Michael Young
NC State University
User-Choice Patterns in PassTiles Graphical Passwords
Elizabeth Stobert, Sonia Chiasson, and Robert Biddle
Carleton University
Virtualization Based Security Framework (vBASE)
Srujan D. Kotikela, Satyajeet Nimgaonkar, and Mahadevan Gomathisankaran
Computer Science and Engineering, University of North Texas