10-12 September 2018 / Cardiff University, Main Building
11th International Conference On Security Of Information and Networks
Accepted Papers
1 Naghmeh Moradpoor (Edinburgh Napier University); Majid Rafiq (ENU); Felisberto Semedo (ENU): Vulnerability Assessment of Objective Function of RPL Protocol for Internet of Things (Full Paper)
3 Ekaterina Maro (Southern Federal University); Maksim Kovalchuk (Dept. of Information Security, Institute of Computer Technologies and Information Security, Southern Federal University): Bypass Biometric Lock Systems With Gelatin Artificial Fingerprint (Fast Abstract/Poster)
4 Alexey Busygin (Peter the Great St.Petersburg Polytechnic University); Artem Konoplev (Peter the Great St.Petersburg Polytechnic University); Maxim Kalinin (Peter the Great St.Petersburg Polytechnic University); Dmitry Zegzhda (Peter the Great St. Petersburg Polytechnic University): Floating Genesis Block Enhancement for Blockchain Based Routing Between Connected Vehicles and Software-defined VANET Security Services (Fast Abstract/Poster)
5 Valeriy Osipovich Osipyan (Kuban State University ); Valeriy O Osipyan (Kuban State University): A mathematical model of the cryptosystem based on the linear Diophantine equation (Short Paper)
6 Yang Ma (London Metropolitan University); Hassan Kazemian (London Metropolitan University): Trapdoor-indistinguishable Secure Channel Free Public Key Encryption with Multi-Keywords Search (Student Contributions) (Full Paper)
7 David A Bird (Northrop Grumman Sperry Marine): A Conceptual Framework To Identify Cyber Risks Associated With The Use Of Public Cloud Computing (Short Paper)
9 Dmitriy K Levonevskiy (SPIIRAS); Ludmila N. Fedorchenko (SPIIRAS); Irina Afanasieva (ITMO University); Fedor Novikov (SPbPU): Architecture of the Software System for Adaptive Protection of Network Infrastructure (Short Paper)
10 John A Curry (Bath Spa University): Developments in State Level Cyber Wargaming (Full Paper)
11 Maxim Pismensky (SFedU); Elena Basan (Department of Information Security Southern Federal University); Oleg Makarevich (Federal University of South Russia): Analysis of the possibilities of creating a protection system for a group of mobile robots (Full Paper)
13 Adnan Imeri (Luxembourg Institute of Science and Technology): Solving the trust issues in the process of transportation of dangerous goods by using blockchain technology (Fast Abstract/Poster)
15 Abdulaziz Almehmadi (University of Tabuk): SCADA Networks Anomaly-based Intrusion Detection System (Short Paper)
16 Magdalena Payeras (UIB); Macià Mut (UIB); Llorenç Huguet (UIB): Anonimity in Secure Access to Integrated Touristic Services Including Payment (Full Paper)
18 Liudmila Babenko (Southern Federal University); Ilya Pisarev (Southern Federal University): Distributed E-Voting System Based On Blind Intermediaries Using Homomorphic Encryption (Full Paper)
21 Khalil El-Khatib (UOIT): Big Data Analytic Architecture for Security Intelligence (Short Paper)
22 Elena Basan (Department of Information Security Southern Federal University); Oleg Makarevich (Federal University of South Russia); Alexander Basan (Southern Federal University): Development of the Anomaly Detection Method for a Group of Mobile Robots (Short Paper)
23 Evgeny Pavlenko (Peter the Great St. Petersburg Polytechnic University); Peter Zegzhda (Peter the Great St. Petersburg Polytechnic University); Dmitry P Zegzhda (Peter the Great St. Petersburg Polytechnic University); Gleb Ignatev (Peter the Great St. Petersburg Polytechnic University): Applying deep learning techniques for Android malware detection (Full Paper)
24 Rawan Baalous (University of Glasgow); R R W Poet (University of Glasgow): How Dangerous Permissions are Described in Android Apps' Privacy Policies? (Fast Abstract/Poster)
25 Alexey Kirillov (Southern Federal University); Lyudmila K Babenko (Southern Federal University): Development of method for malware classification based on statistical methods and an extended set of system calls data (Full Paper)
26 Maxim Kalinin (Peter the Great St.Petersburg Polytechnic University); Vasiliy Krundyshev (Peter the Great St. Petersburg Polytechnic University); Viacheslav Belenko (Branch office of LG Electronics Inc. (Korea) in St. Petersburg): Synthetic datasets generation for intrusion detection in VANET (Full Paper)
27 Gaurav Pareek (National Institute of Technology Goa); Purushothama B R (NIT Goa): Efficient Strong Key Indistinguishable Access Control in Dynamic Hierarchies with Constant Decryption Cost (Full Paper)
28 Evgeny S Abramov (Southern Federal University): Detection of packaged and encrypted program files with the use of machine-learning algorithm (Fast Abstract/Poster)
29 Andrew Stepenkin (Department of Information Security Southern Federal University); Elena Basan (Department of Information Security Southern Federal University): Development of the Methodology for testing the security of group management system for mobile robots (Fast Abstract/Poster)
30 Evgeny S Abramov (Southern Federal University): Identifying Web Resources in Designing of Information Systems Security Based on Web Technologies (Fast Abstract/Poster)
31 Darshil Jain (Manipal University Jaipur); Shreya Khemani (Manipal University Jaipur); Gaurav Prasad (Manipal university Jaipur): Identification of Distributed Malware in Android (Fast Abstract/Poster)
33 Vishnu Kumar (Manipal University Jaipur): Secure Data Aggregation in WSNs: A Two Level Framework (Full Paper)
35 Lauri Koivunen (University of Turku); Sampsa Rauti (University of Turku); Ville Leppänen (University of Turku): Towards Profiling Program Instances in Host-Based Intrusion Detection Systems by Recognizing Software Update Patterns (Short Paper)
36 Igor Kotenko (Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)); Sergey Ageev (Saint Petersburg Institute for Informatics); Igor Saenko (St. Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)): Implementation of Intelligent Agents for Network Traffic and Security Risk Analysis in Cyber-Physical Systems (Short Paper)
37 Alexander Branitskiy (Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)); Igor Kotenko (Saint-Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)): Software Tool for Testing the Packet Analyzer of Network Attack Detection Systems (Full Paper)
38 Roman Demidov (SPBSTU); Pechenkin Alexander (Peter the Great St. Petersburg Polytechnic University): Applying Deep Learning and Vector Representation for Software Vulnerabilities Detection (Full Paper)
43 Evgenia Ishchukova (Southern Federal University, Taganrog, Russia); Maxim Anikeev (SFedU): Linear and Differential Ananlysis of Simplified Kuznyechik cipher (Full Paper)