Archived Papers for Proceeding
The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec)
Publisher: The Society of Digital Information and Wireless Communication
Editors:
ISBN: 978-0-9853483-7-3
Date: 2013-03-04 - 2013-03-06
Conference Venue: Kuala Lumpur, Malaysia
- A REPLAY ATTACK RESISTANCE DRM SCHEME BASED ON PHYSICAL LEVEL FILE LOCATIONAuthors: Cheng Qu, Yinyan Yu, Zhi Tang, Xiaoyu Cui
- EFFECTIVE CORPORATE GOVERNANCE: COMBINING AN ICT SECURITY INCIDENT AND ORGANISATIONAL LEARNINGAuthors: WD Kearney, HA Kruger
- INFORMATION SECURITY MANAGEMENT BEYOND CERTIFICATION AND ACCREDITATIONAuthors: John A. Anderson, Vijay Rachamadugu
- A MULTI-SERVERS REMOTE USER AUTHENTICATION SCHEME USING A SMARTER SMART CARDAuthors: Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan
- EPSILON2 VIRTUAL INFORMATION SECURITY TESTING SYSTEM MARK IIAuthors: Lin G De Luna, Patrick Kevin G Detera, Samuel David F. Guerrero, Hiro R. Mejia, Gomez Miguel Alberto N
- DIGITAL VIDEO WATERMARKING ON CLOUD COMPUTING ENVIRONMENTSAuthors: Chu-Hsing Lin, Chen-Yu Lee, Shih-Pei Chien
- A PROPOSAL AND IMPLEMENTATION OF THE SHOULDER-SURFING ATTACK RESISTANT AUTHENTICATION METHOD USING TWO SHIFT FUNCTIONSAuthors: Yoshihiro Kita, Fumio Sugai, MiRang Park, Naonobu Okazaki
- AN ENTERPRISE-GRADE SECURE DATA STORAGE AND SHARING SYSTEMAuthors: Xu Meng, Liu Fang, Ng Wee Keong
- APPLICATION OF SECRET SHARING TECHNIQUES ON CONFIDENTIAL FORENSIC INVESTIGATIONAuthors: Shuhui Hou, Siuming Yiuy, Tetsutaro Ueharaz, Ryoichi Sasakix
- COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYPERSPACEAuthors: Gianni Fenu, Fabrizio Solinas
- MALWARE PROOF ON MOBILE PHONE EXHIBITS BASED ON GSM/GPRS TRACESAuthors: Philip Schutz, Michael Breuer, Hans Hofken, Marko Schuba
- A NOVEL EVIDENCE INTEGRITY PRESERVATION FRAMEWORK (EIPF) FOR VIRTUALISED ENVIRONMENTS: A DIGITAL FORENSIC APPROACHAuthors: Uchenna Peter Daniel Ani, Gregory Epiphaniou, Tim French
- PASSIVE APPROACH FOR VIDEO FORGERY DETECTION AND LOCALIZATIONAuthors: Cheng-Shain, LinJyh-Jong Tsay
- ON THE SELECTION OF WRITE BLOCKERS FOR DISK ACQUISITION: A COMPARATIVE PRACTICAL STUDYAuthors: Mousa Al Falayleh, Jamal N. Al-Karaki
- VOICE -OVER -IP (VOIP) BANDWIDTH OPTIMIZATION: A SURVEY OF SCHEMES AND TECHNIQUESAuthors: Uchenna Peter Daniel Ani
- EFFICIENT LOCAL RECODING ANONYMIZATION FOR DATASETS WITHOUT ATTRIBUTE HIERARCHICAL STRUCTUREAuthors: Mohammad Rasool Sarrafi Aghdamm, Noboru Sonehara
- FUZZY DESCRIPTION OF SECURITY REQUIREMENTS FOR INTRUSION TOLERANT WEB-SERVICESAuthors: Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman
- DIGITAL BANKING SECURITY, RISK AND CREDIBILITY CONCERNS IN SOUTH AFRICAAuthors: Rabelani Dagada
- INDUSTRIAL ESPIONAGE THREATS IN CORPORATE SOUTH AFRICAAuthors: Rabelani Dagada, Seth Mukwevho
- CANARY FILES: GENERATING FAKE FILES TO DETECT CRITICAL DATA LOSS FROM COMPLEX COMPUTER NETWORKSAuthors: Ben Whitham
- AUTOMATED MALWARE DETECTION FOR ANDROID AMDAAuthors: Kevin Joshua L. Abela, Jan Raynier P. Delas Alas, Don Kristopher E Angeles, Robert Joseph Tolentino, Gomez Miguel Alberto N
- RAM FORENSICS AGAINST CYBER CRIMES INVOLVING FILESAuthors: Mohammed I. Al-Saleh, Ziad A. Al-Sharif
- AUTOMATED SIGNATURE CREATOR FOR A SIGNATURE BASED INTRUSION DETECTION SYSTEM (PANCAKES)Authors: Frances Bernadette De Ocampo, Trisha Mari L. Del Castillo, Gomez Miguel Alberto N
- EMPIRICAL ASSESSMENT OF DATA PROTECTION AND CIRCUMVENTION TOOLS AVAILABILITY IN MOBILE NETWORKSAuthors: Cormac Callanan, Borka Jerman-Blazic, Hein Dries-Ziekenheiner
- INHERENT ID: A NOVEL APPROACH TO DETECT COUNTERFEIT CONSUMER GOODS USING PRODUCT INHERENT FEATURESAuthors: Christian Horn, Matthias Blankenburg, Jorg Kruger
- ADAPTIVE SECURITY AND TRUSTAuthors: Paul Robertson, Robert Laddaga
- THE CYBER DOGS OF WAR: JOINT EFFORTS OF FUTURE WORLD LEADERS IN THE PREVENTION OF CYBERWARFAREAuthors: Nadiya Kostyuk, Marielle Ali
- AWAKEN THE CYBER DRAGON: CHINA'S CYBER STRATEGY AND ITS IMPACT ON ASEANAuthors: Gomez Miguel Alberto N
- BLACKLISTING OF MALICIOUS WEB PAGES BY EVALUATION OF DOMAIN REGISTRATION INFORMATIONAuthors: Ralph Edem Agbefum, Yoshiaki Hori, Kouichi Sakurai
- THE METHODOLOGY OF INTERVIEWING PSYCHIATRIC PATIENTS: TO KNOW PATIENT'S PRIVACY CONCERNS IN BEHAVIOR MONITORING SYSTEMAuthors: Rusyaizila Ramli, Nasriah Zakaria, Norlia Mustaffa
- TULUNGAN: A SELF-PROMOTING- RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILTERING SYSTEMSAuthors: Alexis V. Pantola, Susan Pancho-Festin, Florante Salvador