2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery

17-19 Sept. 2015

Filter Results

Displaying Results 1 - 25 of 111
  • [Front cover]

    Publication Year: 2015, Page(s): C4
    Request permission for commercial reuse | PDF file iconPDF (12020 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2015, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2015, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (137 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2015, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (114 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):v - xi
    Request permission for commercial reuse | PDF file iconPDF (168 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2015, Page(s):xii - xiii
    Request permission for commercial reuse | PDF file iconPDF (282 KB)
    Freely Available from IEEE
  • Message from the Steering Committee Chair

    Publication Year: 2015, Page(s): xiv
    Request permission for commercial reuse | PDF file iconPDF (74 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Technical Program Chairs

    Publication Year: 2015, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (127 KB) | HTML iconHTML
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2015, Page(s):xvi - xviii
    Request permission for commercial reuse | PDF file iconPDF (111 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2015, Page(s):xix - xxiv
    Request permission for commercial reuse | PDF file iconPDF (135 KB)
    Freely Available from IEEE
  • Keynotes

    Publication Year: 2015, Page(s):xxv - xxviii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB)

    Provides an abstract for each of the keynote presentations and may include a brief professional biography of each View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Chaos-Based Hash Function

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (233 KB) | HTML iconHTML

    The paper proposes a cubic chaotic mapping. Its bifurcation graph and Lyapunov exponent show that the mapping owns excellent chaotic properties. A chaos-based hash function is then constructed. Compared to a chaotic hash function based on Logistic mapping, the new hash function not only possesses higher sensitivity to the original message, but also owns better avalanche effect and statistic proper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Implementation of a Hash Function Based on XML DOM Parser

    Publication Year: 2015, Page(s):5 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (241 KB) | HTML iconHTML

    This paper solves the problem of the excessive memory footprint and the slow speed of parsing when using the DOM method to parse the XML data. As we know the current XML parsing technology is the key of XML research field and now there are a lot of XML parsers, their works plays a significant role in promoting XML parsing, but failed to achieve a good balance in the analysis of both time and memor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Kernel Malware Core Implementation: A Survey

    Publication Year: 2015, Page(s):9 - 15
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (214 KB) | HTML iconHTML

    Kernel Malware resides and performs malicious functions in the operating system kernel space. It is more difficult to be detected and cleared than the malwares implemented in the user space because of its higher authority. It also has better flexibility compared with the malware based on the firmware. As a result, the kernel malware is one of the challenging threats in information security. This p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of the Users' Email Behavior Based on BP-BDI Model

    Publication Year: 2015, Page(s):16 - 22
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (542 KB) | HTML iconHTML

    With the development of the Internet, email has become a part of our life to communicate with each other. While bringing convenience for users, it also threats the users' network security. For example, if the user clicks on a malicious URL link in the email, the user's host is likely to be injected by virus, resulting in subsequent network security problems. We call the Internet users' operations ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Hierarchical Framework of Security Situation Assessment for Information System

    Publication Year: 2015, Page(s):23 - 28
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB) | HTML iconHTML

    Security situation assessment is an effective way to analyze the situation of an information system, which helps administrator understand the current system risk status and make policy to response in time. However, the existing researches for security situation assessment mostly focus on network. The proposed methods for network are not so suitable for information systems. This paper proposes a hi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • XSS Vulnerability Detection Using Optimized Attack Vector Repertory

    Publication Year: 2015, Page(s):29 - 36
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    In order to detect the Cross-Site Script (XSS) vulnerabilities in the web applications, this paper proposes a method of XSS vulnerability detection using optimal attack vector repertory. This method generates an attack vector repertory automatically, optimizes the attack vector repertory using an optimization model, and detects XSS vulnerabilities in web applications dynamically. To optimize the a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A 4-Dimensional Discrete Chaotic System and Application in Image Encryption with Avalanche Effects

    Publication Year: 2015, Page(s):37 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (886 KB) | HTML iconHTML

    This paper introduces a 4-dimensional chaotic map, consisting of sine, and cosine functions. Using this map and a generalized synchronization (GCS) theorem designs an 8-dimensional GCS system. The GCS system is used to design a chaotic pseudorandom number generator (CPRNG). Using the FIPS 140-2 test suit/generalized FIPS 140-2 test suit tests the randomness of three 1000-key streams consisting of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced Classification Lists (Dirty Word Lists) for Automatic Security Classification

    Publication Year: 2015, Page(s):44 - 53
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (377 KB) | HTML iconHTML

    With the increasing risk of data leakage, information guards have emerged as a novel concept in the field of security which bears similarity to spam filter that examine the content of the exchanged messages. A guard is defined as a high-assurance device used to control the information flow, typically from a domain with a "high" level of confidentiality, such as a corporate or military network, to ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analysis of Time-Dependencies in Automatic Security Classification

    Publication Year: 2015, Page(s):54 - 61
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Research that explores the use of machine learning for automatic security classification of information objects is about to emerge. In this paper we investigate the opportunity to increase the machine learning performance by taking advantage from time information that is "hidden" in the documents of the training set. This paper presents a technique to do so, and confirms that this is a promising w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Mixed Encryption Algorithm Used in Internet of Things Security Transmission System

    Publication Year: 2015, Page(s):62 - 65
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (216 KB) | HTML iconHTML

    Internet of things has be broadly applied for home, industry, and many other applications. For these applications, secure information transmission becomes a critical issue to ensure the system safety. Hybrid encryption technique is a new cryptographic paradigm and it can be applied to the Internet of Things. It provides the benefit of the symmetric key and asymmetric key performance. It enables st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recovery of Evidence and the Judicial Identification of Electronic Data Based on ExFAT

    Publication Year: 2015, Page(s):66 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (180 KB) | HTML iconHTML

    The ExFAT file system is for large capacity flash memory medium. On the base of analyzing the characteristics of ExFAT file system, this paper presents a model of electronic data recovery forensics and judicial Identification based on ExFAT. The proposed model aims at different destroyed situation of data recovery medium. It uses the file location algorithm, file character code algorithm, document... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A CIM System for Use in the UCWW

    Publication Year: 2015, Page(s):72 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    This paper describes the design and development of a Consumer Identity Module (CIM) system for use in the emerging ubiquitous consumer wireless world (UCWW). The CIM system includes a smart-card, a client application, and a server application. Inserted into an intelligent mobile terminal, the CIM card provides a trusted execution environment for mobile applications. The smart-card application main... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application and Management of Cybersecurity Measures for Protection and Control

    Publication Year: 2015, Page(s):76 - 83
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (198 KB) | HTML iconHTML

    This paper describes the work of CIGRE's JWG B5-D2.46 which is published in technical brochure #603. Described in this paper is a summary of the challenges protection and control engineers and technicians face when required to manage cyber security applications and process for their systems, subsystems and components. When compared to their classical duties for modern power system substation autom... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Android Malware Detection Based on Static Analysis of Characteristic Tree

    Publication Year: 2015, Page(s):84 - 91
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    The number of mobile malware is greatly increasing and the malware detection malware has become a critical problem. Android is fast becoming the most popular mobile platform resulting in quick increase in malware targeting the platform. Current static-analysis practice on Android application package (APK) mainly uses the features such as signature, md5 hash, permissions, data flows, API (Applicati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.