Posters > 2013
Assured Identity and Privacy
- Anonymity and Security in Genomic Datasets [5EC-0F8]
- Covert Channels in Combinatorial Games [278-71C]
- DBMask: Encrypted Query Processing over an Encrypted Database [D41-284]
- Differentially Private Grids for Geospatial Data [33B-B81]
- Digital Forensics Evidence Acquisition In Cloud Storage Service: Examining and Evaluating Tools and Techniques [86F-554]
- Expanding Phish-NET: Detecting Phishing Emails Using Natural Language Processing [FC2-08F]
- Generalized Social Network Privacy [C7D-9F4]
- Hardware/Software-in-the-loop Analysis of Cyberattacks on UASs [63C-E8A]
- Image Steganography Using Sudoku [F63-546]
- Layering Authentication Channels to Provide Covert Communication [764-69B]
- Privacy, Security and Forensics in Software as a Service (SaaS) [688-765]
- Secure and Private Outsourcing to Untrusted Cloud Servers [6B9-411]
- Unlinkable Complex Identity Claims [EA3-1B6]
End System Security
- A Comprehensive Access Control System for Scientific Applications [060-486]
- A Platform for Finding Attacks in Unmodified Implementations of Intrusion Tolerant Systems [CF8-E0A]
- An Efficient Certificateless Cryptography Scheme without Pairing [134-3C1]
- FiPS: A File System Provenance [E11-32B]
- KMAG: VMM-level Malware Detection via Kernel Data Access Profiling [F9A-539]
- Motivation of Community Pharmacies to Use Biometric Authentication [4DC-E1B]
- Secure Information Sharing and Access Control in PLM Systems [2D8-29D]
Human Centric Security
- Determining Authorship with Style [57F-585]
- Effective Risk Communication for Android Apps [9F7-1A6]
- Mutual Restraining Voting Involving Multiple Conflicting Parties [304-694]
- Threats, Vulnerabilities, and Security Controls in Cloud Computing [6BE-F12]
- Trust Management for Social Networks [F47-8F1]
- Using Probabilistic Generative Models for Ranking Risks of Android Apps [10E-F9D]
Network Security
- Adversarial Testing of Wireless Routing Implementations [218-DBC]
- Fine-Grained Analysis of Packet Loss Symptoms in Wireless Sensor Networks [49A-010]
- Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes [273-777]
- Secure Big Data Computations in the Cloud [7DC-D5D]
- Self-organizing self-adaptive network through differential elasticity [FAA-86D]
Policy, Law and Management
- Applying the OSCAR Forensic Framework to Investigations of Cloud Processing [23E-5F7]
- Approaches for Acquiring Data from Flash Memory of Cellular Phone [F44-55B]
- Canada's Cyber Warfare Capabilities [CE3-3FD]
- Cloud Forensics: An Investigation into Imperfect Virtualization [EAB-9FB]
- Cyber Conflict Capability Assessment: Islamic Republic of Iran [FD7-114]
- Cyber Warfare Capabilities Analysis: Brazil [541-9EF]
- Cyber Warfare Capabilities of Brazil [ED6-C5F]
- Forensic Evidence in Apache's CloudStack [633-EDA]
- France's Cyber Defense Capabilities [64C-616]
- International Legal Implications for Cloud Computing [EE8-F7F]
- Israel: An Assessment of Cyber Capabilities [AF7-AB0]
- Open-source analysis of the cyber warfare capability of North Korea [094-DF0]
- Petroleum Cyber Conflict: An Open Source Analysis of Entities’ Means, Motive, and Opportunity for Industry Manipulation [7E5-CF1]
- SaaS Incident Response: Evidence Provenance in a Cloud Service [694-73B]
- UK Leads World Cyber Race [386-E39]
Prevention, Detection and Response
- Chemical Restoration of Damaged Hard Drives [B7B-654]
- Forensic Implications of Apple's New Fusion Drive. [9D1-0DA]
- PostgreSQL anomaly detector [95C-D35]
- Predicting Failures in Distributed Cloud-Based Systems [18C-1F4]
- pSigene: Webcrawling to Generalize SQLi Signatures [9C3-767]
- Security Analysis for Cyber-Physical Systems against Stealthy Cyber Attacks [41E-B03]