Annual Computer Security Applications Conference (ACSAC) 2012

Full Program »

Reception and Poster Session

Thursday, 6 December 2012
18:15 - 21:00

20Seven

A credible cost-sensitive model for intrusion response selection
Aderonke J., Ikuomola and Adesina S., Sodiya
Department of Computer Science, University of Agriculture Abeokuta Ogun State, Nigeria

FIREAXE: Forging Impervious and Resilient Entities for Adversarial Execution Environments
Will Atkins and Yevgeniy "Eugene" Vorobeychik
The Center for Cyber Defenders

HAS Analysis: Detecting HTTP-based C&Cs based on the Analysis of HTTP Activity Sets
Sungjin Kim, Yujeong Han, Jaesung Lee, Younghan Choi, Byungchul Bae, Hyunggeun Oh, and Kiwook Sohn
The Attached Institute of ETRI, Daejeon, Korea

Linking Cybersecurity Knowledge: Cybersecurity Informatino Discovery Mechanism
Takeshi Takahashi, Youki Kadobayashi, and Yuuki Takano
National Institute of Information and Communications Technology, Tokyo, Japan

NDN Interest Flooding Attacks and Countermeasures
Alberto Compagno, Mauro Conti, Paolo Gasti, and Gene Tsudik
University of Padua, Italy; New York Institute of Technology, USA; University of California, Irvine, USA

PUSH IDENTITY; Usable Single Sign-on
Kyohei Furukawa and Manabu Okamoto
Kanagawa Institute of Technology, Japan

Policy Management in Cloud Computing Environments
Hassan Takabi and James B. D. Joshi
School of Information Sciences, University of Pittsburgh

Robust and Effective Feature Selection for Opinion Spam Detection
Rakesh Verma and Ekene Sibeudu
University of Houston, USA; University of Maryland Baltimore, USA

Role Based Access Control For Android
Felix Rohrer, Yuting Zhang, Lou Chitkushev, and Tanya Zlateva
Computer Science Department, Metropolitan College, Boston University, USA

Securing Online Reputation Systems through Dempster-Shafer Theory based Trust Model
Yuhong Liu, Yan (Lindsay) Sun, Siyuan Liu, and Alex C. Kot
Department of Electrical and Computer Engineering University of Rhode Island, USA; School of Electrical and Electrinic Engineering, Nanyang Technological University, Singapore

Teaching Security with Interactive Exercises
Richard Weiss and Jens Mache
The Evergreen State College, USA; Lewis & Clark College, USA

Toward Unobservable Data Sharing in Overlay Networks
Qingfeng Tan, Jinqiao Shi, Xiaojun Chen, Fanwen Xu, and Shoufeng Cao
Chinese National Engineering laboratory for Information Security Technologies; Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China; Department of Computer Science, Beijing University of Posts and Telecommunications, Beijing, China; National Computer Network Emergency Persons Technical Team/Coordination Center of China
 

 

Powered by OpenConf®
Copyright©2002-2014 Zakon Group LLC