By Topic

Applications and the Internet (SAINT), 2012 IEEE/IPSJ 12th International Symposium on

Date 16-20 July 2012

Filter Results

Displaying Results 1 - 25 of 90
  • [Back cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (437 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (62 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (118 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - xii
    Request permission for commercial reuse | PDF file iconPDF (149 KB)
    Freely Available from IEEE
  • Message from General Chairs

    Publication Year: 2012, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (149 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Program Chairs

    Publication Year: 2012, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (121 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Workshop Co-chairs

    Publication Year: 2012, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (137 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from Doctoral Symposium Co-chairs

    Publication Year: 2012, Page(s): xvi
    Request permission for commercial reuse | PDF file iconPDF (135 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2012, Page(s):xvii - xviii
    Request permission for commercial reuse | PDF file iconPDF (95 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s):xix - xxii
    Request permission for commercial reuse | PDF file iconPDF (109 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s):xxiii - xxvi
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Message from HSNCE 2012 Workshop Organizers

    Publication Year: 2012, Page(s): xxvii
    Request permission for commercial reuse | PDF file iconPDF (142 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from WS-ITeS 2012 Workshop Organizers

    Publication Year: 2012, Page(s): xxviii
    Request permission for commercial reuse | PDF file iconPDF (132 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from NETSAP 2012 Workshop Organizers

    Publication Year: 2012, Page(s): xxix
    Request permission for commercial reuse | PDF file iconPDF (121 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from HEUNET 2012 Workshop Organizers

    Publication Year: 2012, Page(s): xxx
    Request permission for commercial reuse | PDF file iconPDF (139 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from C3NET 2012 Workshop Organizers

    Publication Year: 2012, Page(s): xxxi
    Request permission for commercial reuse | PDF file iconPDF (122 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from EUCASS 2012 Workshop Organizers

    Publication Year: 2012, Page(s): xxxii
    Request permission for commercial reuse | PDF file iconPDF (121 KB) | HTML iconHTML
    Freely Available from IEEE
  • HEUNET 2012 Plenary Speakers

    Publication Year: 2012, Page(s): xxxiii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (135 KB)

    These plenary speeches discuss the following: Heuristics and Metaheuristics for Practical Optimisation in Wireless Networks and The Cloudy Sky of Programmable Infrastructures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Location l-Diversity against Multifarious Inference Attacks

    Publication Year: 2012, Page(s):1 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1080 KB) | HTML iconHTML

    The increasing use of location-based services leads these users to publish their locations unintentionally. Adversarial attackers can identify the user and find sensitive locations where the user often visits. Although l-diversity can be applied to location data and protect the user's privacy by preserving variations of locations, it does not consider the difference of the adversary's knowledge an... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proposal of Movie CAPTCHA Method Using Amodal Completion

    Publication Year: 2012, Page(s):11 - 18
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    Web services accounts have recently been automatically acquired in large quantities by bot-programs, which are malicious. Furthermore, the acquired accounts have been used for spamming, which is a problem for service operators or Internet users. Completely Automated Public Turing Tests To Tell Computers and Humans Apart (CAPTCHAs) have generally been adopted for Web Services as a method of prevent... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and Implementation of a Secure Public Wireless Internet Service Model Using Host Identity Protocol

    Publication Year: 2012, Page(s):19 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4675 KB) | HTML iconHTML

    In an ideal ubiquitous network, everyone can access the Internet when some connectivity exists there. A network administrator is supposed to provide a connection to public visitors securely. In this paper, we propose a secure public wireless Internet service model using Host identity Protocol (HIP). Services based on the model allow everyone to provide a connection. We give some consideration to i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detecting Malicious Websites by Learning IP Address Features

    Publication Year: 2012, Page(s):29 - 39
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (399 KB) | HTML iconHTML

    Web-based malware attacks have become one of the most serious threats that need to be addressed urgently. Several approaches that have attracted attention as promising ways of detecting such malware include employing various blacklists. However, these conventional approaches often fail to detect new attacks owing to the versatility of malicious websites. Thus, it is difficult to maintain up-to-dat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable and Performance-Efficient Client Honeypot on High Interaction System

    Publication Year: 2012, Page(s):40 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (477 KB) | HTML iconHTML

    We investigated client honeypots for detecting and circumstantially analyzing drive-by download attacks. A client honeypot requires both improved inspection performance and in-depth analysis for inspecting and discovering malicious websites. However, OS overhead in recent client honeypot operation cannot be ignored for improving honeypot multiplication performance. We propose a client honeypot cli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SSH Dictionary Attack Detection Based on Flow Analysis

    Publication Year: 2012, Page(s):51 - 59
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    SSH services are run on many hosts with various scopes other than just operation, so dictionary attack against the service is a common security threat. SANS has reported the emergence of distributed SSH dictionary attacks, which are very stealthy in comparison with a simple one. Since even one success of such an attack causes serious problems, administrators should implement countermeasures. SSH d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.