IAS 2014


Cluster Head Election in Wireless Sensor Networks
Sara Elrefaay, Marianne Azer and Nashwa Abdelbaki

Towards Secure End-to-End Data Aggregation in AMI through Delayed-Integrity-Verification
Sye Loong Keoh and Zhaohui Tang

ETC: Effective Trustworthy Communication with Two-mode Authentication for Disaster Recovery
Tanapat Ruengsatra, Kulit Na Nakorn, Kultida Rojviboonchai and Krerk Piromsopa

TWalker: An Efficient Taint Analysis Tool
Jinxin Ma ,Puhan Zhang, Guowei Dong, Shuai Shao and Jiangxiao Zhang

Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Erwan Godefroy, Eric Totel, Michel Hurfin and Frederic Majorczyk

Passive Video Forgery Detection Techniques: A Survey
Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Mohd. Yamani Idna Idris, Suleman Khan, Zaidi Razak and Muhammad Rezal Kamel Ariffin

Improving Web Application Firewalls to Detect Advanced SQL Injection Attacks
Abdelhamid Makiou, Youcef BEGRICHE and Ahmed SERHROUCHNI

Optimization of Excerpt Query Process for Packet Attribution System
Shesha Shila Bharadwaj Renukuntla and Shatrunjay Rawat

Security assurance of local data stored by HTML5 web application
Mayssa Jemel and Ahmed Serhrouchni

Context-Aware Intrusion Alerts Verification Approach
Sherif Saad, Issa Traore and Marcelo Brocardo

A Novel Psychovisual Model on An Independent Video Frame for Almost Lossless Compression
Nur Azman Abu and Muhammad Rezal Kamel Ariffin

Secure firmware architecture using virtual hard disks
Jaebum Sim and Jungchan Na

An Experimental Study on Firewall Performance
Chenghong Wang, Donghong Zhang, Hualin Lu, Jing Zhao, Zhenyu Zhang and Zheng Zheng

Extraction method of Region of Interest from hand palm: Application with contactless and touchable devices
Artabaz Saliha, Benatchba Karima, Koudil Mouloud, Dellys Hachemi Nabil, and Bouridane Ahmed