By Topic

Cybercrime and Trustworthy Computing Workshop (CTC), 2012 Third

Date 29-30 Oct. 2012

Filter Results

Displaying Results 1 - 21 of 21
  • [Front cover]

    Publication Year: 2012, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (1407 KB)
    Freely Available from IEEE
  • Proceedings of the 2012 Third Cybercrime and Trustworthy Computing Workshop (CTC 2012)

    Publication Year: 2012, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2012, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (51 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2012, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (130 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2012, Page(s):v - vi
    Request permission for commercial reuse | PDF file iconPDF (121 KB)
    Freely Available from IEEE
  • Welcome message

    Publication Year: 2012, Page(s): vii
    Request permission for commercial reuse | PDF file iconPDF (70 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2012, Page(s):viii - ix
    Request permission for commercial reuse | PDF file iconPDF (75 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2012, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (70 KB)
    Freely Available from IEEE
  • A Data Security Protection Mechanism Based on Transparent Biometric Authentication for Mobile Intelligent Terminals

    Publication Year: 2012, Page(s):1 - 6
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (266 KB) | HTML iconHTML

    The proliferations of the mobile intelligent terminal have brought them to the spotlight of the attackers for the sensitive information they carried. However, the current security schemes on the mobile intelligent terminal are fragile. This paper proposed a new transparent authentication and encryption measure to protect the confidentiality and integrity of the data on the mobile intelligent termi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Authorship Attribution of IRC Messages Using Inverse Author Frequency

    Publication Year: 2012, Page(s):7 - 13
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    Internet Relay Chat (IRC) is a useful and relatively simple protocol for text based chat online, used in a variety of areas online such as for discussion and technical support. IRC is also used for cybercrime, with online rooms selling stolen credit card details, botnet access and malware. The reasons for the use of IRC in cybercrime include the widespread adoption and ease of use, but also focus ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Challenges to Automated Allegory Resolution in Open Source Intelligence

    Publication Year: 2012, Page(s):14 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (234 KB) | HTML iconHTML

    The resolution of lexical ambiguity in machine translation systems often involves the automated, on-line selection of the correct sense of polysemous target words in the context of a clause, phrase or sentence. However, the performance of machine translation systems in emulating this aspect of human language processing has not been entirely successful, to the extent that resolution of entities and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterising Network Traffic for Skype Forensics

    Publication Year: 2012, Page(s):19 - 27
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (485 KB) | HTML iconHTML

    Voice over IP (VoIP) is increasingly replacing fixed line telephone systems globally due to lower cost, call quality improvements over digital lines and ease of availability. At the same time, criminals have also transitioned to using this environment, creating challenges for law enforcement, since interception of VoIP traffic is more difficult than a traditional telephony environment. One key pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Identifying Cyber Predators through Forensic Authorship Analysis of Chat Logs

    Publication Year: 2012, Page(s):28 - 37
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (551 KB) | HTML iconHTML

    Online Grooming is a growing phenomenon within online environments. One of the major problems encountered in qualitative internet research of chat communication is the issue of anonymity which is being exploited and greatly enjoyed by chatters. An important question that has been asked in the literature is 'How can a researcher be sure to analyse the communication of children and adolescents and n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Malicious Code Detection Using Penalized Splines on OPcode Frequency

    Publication Year: 2012, Page(s):38 - 47
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    Recently, malicious software are gaining exponential growth due to the innumerable obfuscations of extended x86 IA-32 (OPcodes) that are being employed to evade from traditional detection methods. In this paper, we design a novel distinguisher to separate malware from benign that combines Multivariate Logistic Regression model using kernel HS in Penalized Splines along with OPcode frequency featur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Malware Expert: Execution Tracking

    Publication Year: 2012, Page(s):48 - 55
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    In most cases, one of the major goals of behavioral malware analysis is to extract from malware samples the intelligence critical to identify the nature of malware. Given the increasing complexity of operating system and its services that creates a significant volume of noise in the background, malware intelligence gathering process is required to minimise non malware related information while not... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Intelligent Terminal Based Remote Monitoring and Management System

    Publication Year: 2012, Page(s):56 - 59
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (587 KB) | HTML iconHTML

    It is very important and difficult for remote monitoring and alarming in places such as Laboratory, Office, Residential Area and Hotels etc. This paper implemented a Remote Monitoring Alarming and Management System Based on Mobile Intelligent Terminal (RMAS-MIT), the remote monitoring and alarming system (RMAS) is composed of the front video collecting system, pre-processing system, data transmiss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prudent Fraud Detection in Internet Banking

    Publication Year: 2012, Page(s):60 - 65
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (159 KB) | HTML iconHTML

    Most commercial Fraud Detection components of Internet banking systems use some kind of hybrid setup usually comprising a Rule-Base and an Artificial Neural Network. Such rule bases have been criticised for a lack of innovation in their approach to Knowledge Acquisition and maintenance. Furthermore, the systems are brittle; they have no way of knowing when a previously unseen set of fraud patterns... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Strategies for Neutralising Sexually Explicit Language

    Publication Year: 2012, Page(s):66 - 74
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (335 KB) | HTML iconHTML

    While scales for the 'strength' of pornographic images have been developed and used in research and for judicial purposes, the potential emotive impact of text-based pornography has received little attention. In this paper we describe our approach to characterising dimensions of sexually explicit language and outline their use in strategies for neutralising such language. Our intended application ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an Implementation of Information Flow Security Using Semantic Web Technologies

    Publication Year: 2012, Page(s):75 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    Controlling the flow of sensitive data has been widely acknowledged as a critical aspect for securing web information systems. A common limitation of previous approaches for the implementation of the information flow control is their proposal of new scripting languages. This makes them infeasible to be applied to existing systems written in traditional programming languages as these systems need t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2012, Page(s): 81
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • [Publisher's information]

    Publication Year: 2012, Page(s): 82
    Request permission for commercial reuse | PDF file iconPDF (125 KB) | HTML iconHTML
    Freely Available from IEEE