ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Proceeding

The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec)

Publisher: The Society of Digital Information and Wireless Communication

Editors:

ISBN: 978-0-9853483-7-3

Date: 2013-03-04 - 2013-03-06

Conference Venue: Kuala Lumpur, Malaysia Malaysia

Proceeding URL: http://sdiwc.net/conferences/2013/Malaysia3external

  1. A REPLAY ATTACK RESISTANCE DRM SCHEME BASED ON PHYSICAL LEVEL FILE LOCATION

    Authors: Cheng Qu, Yinyan Yu, Zhi Tang, Xiaoyu Cui

  2. EFFECTIVE CORPORATE GOVERNANCE: COMBINING AN ICT SECURITY INCIDENT AND ORGANISATIONAL LEARNING

    Authors: WD Kearney, HA Kruger

  3. INFORMATION SECURITY MANAGEMENT BEYOND CERTIFICATION AND ACCREDITATION

    Authors: John A. Anderson, Vijay Rachamadugu

  4. A MULTI-SERVERS REMOTE USER AUTHENTICATION SCHEME USING A SMARTER SMART CARD

    Authors: Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan

  5. EPSILON2 VIRTUAL INFORMATION SECURITY TESTING SYSTEM MARK II

    Authors: Lin G De Luna, Patrick Kevin G Detera, Samuel David F. Guerrero, Hiro R. Mejia, Gomez Miguel Alberto N

  6. DIGITAL VIDEO WATERMARKING ON CLOUD COMPUTING ENVIRONMENTS

    Authors: Chu-Hsing Lin, Chen-Yu Lee, Shih-Pei Chien

  7. A PROPOSAL AND IMPLEMENTATION OF THE SHOULDER-SURFING ATTACK RESISTANT AUTHENTICATION METHOD USING TWO SHIFT FUNCTIONS

    Authors: Yoshihiro Kita, Fumio Sugai, MiRang Park, Naonobu Okazaki

  8. AN ENTERPRISE-GRADE SECURE DATA STORAGE AND SHARING SYSTEM

    Authors: Xu Meng, Liu Fang, Ng Wee Keong

  9. APPLICATION OF SECRET SHARING TECHNIQUES ON CONFIDENTIAL FORENSIC INVESTIGATION

    Authors: Shuhui Hou, Siuming Yiuy, Tetsutaro Ueharaz, Ryoichi Sasakix

  10. COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYPERSPACE

    Authors: Gianni Fenu, Fabrizio Solinas

  11. MALWARE PROOF ON MOBILE PHONE EXHIBITS BASED ON GSM/GPRS TRACES

    Authors: Philip Schutz, Michael Breuer, Hans Hofken, Marko Schuba

  12. A NOVEL EVIDENCE INTEGRITY PRESERVATION FRAMEWORK (EIPF) FOR VIRTUALISED ENVIRONMENTS: A DIGITAL FORENSIC APPROACH

    Authors: Uchenna Peter Daniel Ani, Gregory Epiphaniou, Tim French

  13. PASSIVE APPROACH FOR VIDEO FORGERY DETECTION AND LOCALIZATION

    Authors: Cheng-Shain, LinJyh-Jong Tsay

  14. ON THE SELECTION OF WRITE BLOCKERS FOR DISK ACQUISITION: A COMPARATIVE PRACTICAL STUDY

    Authors: Mousa Al Falayleh, Jamal N. Al-Karaki

  15. VOICE -OVER -IP (VOIP) BANDWIDTH OPTIMIZATION: A SURVEY OF SCHEMES AND TECHNIQUES

    Authors: Uchenna Peter Daniel Ani

  16. EFFICIENT LOCAL RECODING ANONYMIZATION FOR DATASETS WITHOUT ATTRIBUTE HIERARCHICAL STRUCTURE

    Authors: Mohammad Rasool Sarrafi Aghdamm, Noboru Sonehara

  17. FUZZY DESCRIPTION OF SECURITY REQUIREMENTS FOR INTRUSION TOLERANT WEB-SERVICES

    Authors: Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman

  18. DIGITAL BANKING SECURITY, RISK AND CREDIBILITY CONCERNS IN SOUTH AFRICA

    Authors: Rabelani Dagada

  19. INDUSTRIAL ESPIONAGE THREATS IN CORPORATE SOUTH AFRICA

    Authors: Rabelani Dagada, Seth Mukwevho

  20. CANARY FILES: GENERATING FAKE FILES TO DETECT CRITICAL DATA LOSS FROM COMPLEX COMPUTER NETWORKS

    Authors: Ben Whitham

  21. AUTOMATED MALWARE DETECTION FOR ANDROID AMDA

    Authors: Kevin Joshua L. Abela, Jan Raynier P. Delas Alas, Don Kristopher E Angeles, Robert Joseph Tolentino, Gomez Miguel Alberto N

  22. RAM FORENSICS AGAINST CYBER CRIMES INVOLVING FILES

    Authors: Mohammed I. Al-Saleh, Ziad A. Al-Sharif

  23. AUTOMATED SIGNATURE CREATOR FOR A SIGNATURE BASED INTRUSION DETECTION SYSTEM (PANCAKES)

    Authors: Frances Bernadette De Ocampo, Trisha Mari L. Del Castillo, Gomez Miguel Alberto N

  24. EMPIRICAL ASSESSMENT OF DATA PROTECTION AND CIRCUMVENTION TOOLS AVAILABILITY IN MOBILE NETWORKS

    Authors: Cormac Callanan, Borka Jerman-Blazic, Hein Dries-Ziekenheiner

  25. INHERENT ID: A NOVEL APPROACH TO DETECT COUNTERFEIT CONSUMER GOODS USING PRODUCT INHERENT FEATURES

    Authors: Christian Horn, Matthias Blankenburg, Jorg Kruger

  26. ADAPTIVE SECURITY AND TRUST

    Authors: Paul Robertson, Robert Laddaga

  27. THE CYBER DOGS OF WAR: JOINT EFFORTS OF FUTURE WORLD LEADERS IN THE PREVENTION OF CYBERWARFARE

    Authors: Nadiya Kostyuk, Marielle Ali

  28. AWAKEN THE CYBER DRAGON: CHINA'S CYBER STRATEGY AND ITS IMPACT ON ASEAN

    Authors: Gomez Miguel Alberto N

  29. BLACKLISTING OF MALICIOUS WEB PAGES BY EVALUATION OF DOMAIN REGISTRATION INFORMATION

    Authors: Ralph Edem Agbefum, Yoshiaki Hori, Kouichi Sakurai

  30. THE METHODOLOGY OF INTERVIEWING PSYCHIATRIC PATIENTS: TO KNOW PATIENT'S PRIVACY CONCERNS IN BEHAVIOR MONITORING SYSTEM

    Authors: Rusyaizila Ramli, Nasriah Zakaria, Norlia Mustaffa

  31. TULUNGAN: A SELF-PROMOTING- RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILTERING SYSTEMS

    Authors: Alexis V. Pantola, Susan Pancho-Festin, Florante Salvador