Home // Sec

International Journal On Advances in Security, volume 8, numbers 1 and 2, 2015

Type: journal

Notes: A free access journal featuring works submitted on an invitation basis only.

ISSN: 1942-2636

Articles: there are 8 articles

Improvement of User Profiling, Call Destination Profiling and Behavior Pattern Recognition Approaches for Telephony Toll Fraud Detection
Anton Wiens, Sandra Kübler, Torsten Wiens, and Michael Massoth
keywords: Fraud detection; telephony; CDR; behavior profiling; statistical

A Framework Balancing Privacy and Cooperation Incentives in User-Centric Networks
Alessandro Aldini
keywords: user-centric networks; privacy; trust; cooperation incentives; model checking

Integrated Technologies for Communication Security and Secure Deletion on Android Smartphones
Alexandre Braga, Daniela Schwab, Eduardo Morais, Romulo Neto, and André Vannucci
keywords: cryptography; surveillance; security; Android; instant message; secure deletion; secure storage; encrypted file system; flash memory

Symbolic Execution Based Automated Static Bug Detection for Eclipse CDT
Andreas Ibing
keywords: static analysis, symbolic execution

Reflections on Evolving Large-Scale Security Architectures
Geir M. Køien
keywords: Evolving Security; System Security; Security Architecture; Long-term security planning; Migration; Mitigation; Deprecation.

The Policy-Based AS_PATH Verification to Prevent 1-Hop AS Path Hijacking By Monitoring BGP Live Streams
Je-Kuk Yun, Beomseok Hong, and Yanggon Kim
keywords: border gateway protocol; interdomain routing; network security; networks; AS path hijacking.

Using Managed Certificate Whitelisting as a Basis for Internet of Things Security in Industrial Automation Applications
Rainer Falk and Steffen Fries
keywords: Digital certificate; certificate whitelisting; credential management; PKI; device authentication; Internet of Things.

Impacts on Database Performance in a Privacy-Preserving Biometric Authentication Scenario
Veit Köppen, Christian Krätzer, Jana Dittmann, Gunter Saake, and Claus Vielhauer
keywords: Database Security, Homomorphic Encryption, Privacy, Multi-Computer Scenarios, Database Performance, Biometric Authentication