Accepted Papers

All the accepted regular papers and short papers will be published in the same NSS 2010 proceedings. The only difference is that the regular papers have 8 pages limit and short papers have 6 pages limit.

Accepted regular papers

Paper ID Authors and Title
8 Mohamed Nassar, Radu State and Olivier Festor. A framework for monitoring SIP enterprise networks
12 Ion Alberdi, Vincent Nicomette and Philippe Owezarski. Luth: Composing and Parallelizing Midpoint Inspection Devices
19 Kun Peng and Feng Bao. Efficient Proof Of Validity Of Votes In Homomorphic E-Voting
22 Sebastian Roschke, Feng Cheng and Christoph Meinel. A Flexible and Efficient Alert Correlation Platform for Distributed IDS
23 McKay Williams, Sheldon Munns, Michael Temple and Michael Mendenhall. RF-DNA Fingerprinting for Airport WiMax Communications Security
24 Thomas Clausen and Ulrich Herberg. Router and Link Admittance Control in the Optimized Link State Routing Protocol version 2 (OLSRv2)
25 Cynthia Wagner, Gerard Wagener, Radu State, Alexandre Dulaunoy and Thomas Engel. Breaking Tor Anonymity with Game Theory and Data Mining
26 Hao Gao, Jun Yan and Yi Mu. Dynamic Trust Model for Federated Identity Management
29 Peter Danner, Daniel Hein and Stefan Kraxberger. Securing Emergency Response Operations Using Distributed Trust Decisions
31 Qiang Liu, Jian-ping Yin, Zhi-ping Cai and Ming Zhu. A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability Analysis
34 Mohammed Alzomai and Audun Josang. The Mobile Phone as a Multi OTP Device Using Trusted Computing
41 Jinchao Xu and Guosun Zeng. A software watermarking algorithm based on stack states transition graph
43 Mansoor Alicherry and Angelos Keromytis. DIPLOMA: Distributed Policy Enforcement Architecture for MANETs
45 Xiaoxun Sun and Hua Wang. Towards Identify Anonymization in Large Survey Rating Data
46 alban gabillon and leo letouzey. A view based access control model for SPARQL
48 Li Lin, Christopher Leckie and Chenfeng Zhou. Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-Grams
50 Andrew White, Alan Tickle and Andrew Clark. Overcoming Reputation and Proof-of-Work Systems in Botnets
59 Yinghua Guo and Matthew Simon. Network forensics in MANET: traffic analysis of source spoofed DoS attacks
66 chunli lv, XiaoQi Jia, Li-Jun TIAN and JiWu Jing. Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR operations
70 Aashish Sharma, Zbigniew Kalbarczyk, Ravishankar Iyer and James Barlow. Analysis of Credentials Stealing Attacks in an Open Networked Environment
72 Richard Sinnott and Sardar Hussain. Security-oriented Workflows for the Social Sciences
78 Fengyu Wang, Bin Gong, Shanqing Guo and Xiaofeng Wang. Monitoring Heavy-Hitter Flows in High-Speed Network Concurrently
80 Abdelberi Chaabane, Pere Manils and Mohamed Ali Kaafar. A Deep Analysis of the Tor Anonymizing Network
81 Suriadi Suriadi, Andrew Clark and Desmond Schmidt. Validating Denial of Service Vulnerabilities in Web Services
86 Juan E. Tapiador and John A. Clark. Information-Theoretic Detection of Masquerade Mimicry Attacks
89 Reginald Lal and Andrew Chiou. Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge Network
91 Yang Liu and Kai Han. Behavior-based Attack Detection and Reporting in Wireless Sensor Networks
104 Kobra Khanmohammadi and Siv Hilde Houmb. Business Process-based Information Security Risk Assessment
109 Wael Kanoun, Nora Cuppens-Boulahia, Fr��¦d��¦ric Cuppens and Samuel Dubus. Risk-aware Framework for Activating and Deactivating Policy-based Response
121 Shan Juan Xie, Sook Yoon and Dong Sun Park. Fingerprint Reference Point Determination Based on Orientation Features
122 Anya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursault, C��¦dric Lauradoux and Marine Minier. Energy Friendly Integrity for Network Coding in Wireless Sensor Networks
125 Alessandro Artale, Bruno Crispo, Fausto Giunchiglia, Fatih Turkmen and Rui Zhang. Reasoning about Relation Based Access Control
127 Hua Wang and Li Sun. Trust-involved access control in collaborative open social networks
128 Sheng Wen and Wanlei Zhou. CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd

Accepted short papers

Paper ID Authors and Title
10 Islam Tharwat, Hossam Fahmy, Ayman M. Bahaa El-Din and Mohamed hassan El-Shafie. Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad-hoc Networks
17 Celia Li, Zhuang Wang and Cungang Yang. Secure Routing for Wireless Mesh Networks
38 Sheila Becker, Humberto Abdelnur, Jorge Lucangeli Obes, Radu State and Olivier Festor. Improving Fuzz Testing using Game Theory
44 Rodrigo Roman, Javier Lopez, Cristina Alcaraz and Pablo Najera. Wireless Sensor Networks and the Internet of Things: Do We Need a Complete Integration?
47 Adonis P.H. Fung and K.W. Cheung. HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached Javascript
49 Raihana Ferdous, Vallipuram Muthukkumarasamy and Abdul Sattar. A Node-based Trust Management Scheme for Mobile Ad-Hoc Networks
54 Lifang Zi, John Yearwood and Xinwen Wu. Adaptive Clustering with Feature Ranking for DDoS Attacks Detection
56 Ahmad Jabas, wael abdulal and Ramachandram Sirandas. An Efficient and High Scalable Key distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data Patterns
57 Yinghua Guo and Ivan Lee. Forensic analysis of DoS attack traffic in MANET
58 Yingjie Zhou and Guangmin Hu. Graph Based Network-Wide Concealed Anomaly Detection
64 Robert Koch and Gabi Dreo. Command Evaluation in Encrypted Remote Sessions
67 Rong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai and Shi-Jinn Horng. Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data Hiding
71 Qussai Yaseen and Brajendra Panda. Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders¡¯ Knowledgebase
77 Mao Huang, Liangfu Lu, Mehmet Orgun and Jiawan Zhang. An Improved Wavelet Analysis Method for Detecting DDoS Attacks
79 Patryk Szewczyk and Craig Valli. Ignorant Experts: Computer and Network Security Support from Internet Service Providers
94 Ray Hunt and jill Slay. The Design of Real-time Adaptive Forensically Sound Secure Critical Infrastructure
97 Eun-Jun Yoon and kee-Young Yoo. A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic Curves
98 Ron van Schyndel, Udaya Parampalli, Oscar Moreno and Andrew Tirkel. New Families of 2D & 3D Arrays for Sub-Image Watermarking
102 Manzur Murshed, Tishna Sabrina, Anindya Iqbal and Kh Mahmudul Alam. A Novel Anonymization Technique to Trade-off Location Privacy and Data Integrity in Participatory Sensing System
103 Shamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney and Colin Fidge. Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer Types
113 Thaneswaran Velauthapillai, Aaron Harwood and Shanika Karunasekera. Global Detection of Flooding-Based DDoS Attacks Using a Cooperative Overlay Network
117 Steven Simpson, Adam Lindsay and David Hutchison. Identifying Legitimate Clients under Distributed Denial-of-Service Attacks
123 Matthieu-P. Schapranow. A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third-Party Access
126 Ping Li, Wanlei Zhou and Yini Wang. Getting the Real-Time Precise Round-Trip Time for Stepping Stone Detection
129 Kamaruddin Mohamad, jemal abawajy and Mustafa Deris. DQT-Based Data Hiding Technique in Digital Images