Conferences in Research and Practice in Information Technology
  

Online Version - Last Updated - 13 Jan 2014

 

 
Home
 

 
Procedures and Resources for Authors

 
Information and Resources for Volume Editors
 

 
Orders and Subscriptions
 

 
Published Articles

 
Upcoming Volumes
 

 
Contact Us
 

 
Useful External Links
 

 
CRPIT Site Search
 
    

Volume 149 - Twelfth Australasian Information Security Conference

(AISC 2014), Auckland, New Zealand, January 2014

This volume contains papers presented at the Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand, January 2014. Where indicated, the paper is available for download in PDF or Postscript format.

The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included.

Edited by

Udaya Parampalli and Ian Welch.

Published

January 2014.

ISBN-13

978-1-921770-32-6.

ISSN

1445-1336.

9 papers, xv+87pages.

BiBTeX file for Volume.

Complete Volume.

 
Acceptance Rate Information.

The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 41.2% (7 from 17).


Volume Citation

Udaya Parampalli and Ian Welch Eds. (2014). Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014). CRPIT. 149. Auckland, New Zealand, ACS.


Papers Included in the Volume

Mansoori, M., Welch, I. and Fu, Q. (2014). YALIH, Yet Another Low Interaction Honeyclient. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 7-15. abstractpdfBibTeXEndNoteGS

Kush,N., Ahmed, E., Branagan,M. and Foo, E. (2014). Poisoned GOOSE: Exploiting the GOOSE Protocol. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 17-22. abstractpdfBibTeXEndNoteGS

Alhamdan, A., Bartlett, H., Dawson, E., Simpson, L. and Wong, K. K. (2014). Weak key-IV Pairs in the A5/1 Stream Cipher. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 23-36. abstractpdfBibTeXEndNoteGS

Radke,K., Boyd, C., Nieto, J. G., Manulis, M. and Stebila, D. (2014). Formalising Human Recognition: a Fundamental Building Block for Security Proofs. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 37-45. abstractpdfBibTeXEndNoteGS

Seneviratne, J., Parampalli, U. and Kulik, L. (2014). An Authorised Pseudonym System for Privacy Preserving Location Proof Architectures. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 47-56. abstractpdfBibTeXEndNoteGS

Bhatia, S., Kush, N., Djamaludin, C., Akande, A. and Foo, E. (2014). Practical Modbus Flooding Attack and Detection. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 57-65. abstractpdfBibTeXEndNoteGS

Bajaj, K. and Pieprzyk, J. (2014). A Case Study of User-Level Spam Filtering. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 67-75. abstractpdfBibTeXEndNoteGS

Teo, S., Wong, K. K., Bartlett, H., Simpson, L. and Dawson, E. (2014). Algebraic analysis of Trivium-like ciphers (Poster). In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 77-81. abstractpdfBibTeXEndNoteGS

Jayarathna, D., Tupakula, U. and Varadharajan, V. (2014). Hypervisor-based Security Architecture for Validating DNS Services (Poster). In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 83-86. abstractpdfBibTeXEndNoteGS

Papers listed: 9

 

 

ACS Logo© Copyright Australian Computer Society Inc. 2001-2014.
Comments should be sent to the webmaster at crpit@scem.uws.edu.au.
This page last updated 10 Jan 2014