|
| | | |
Volume 149 - Twelfth Australasian Information Security Conference(AISC 2014), Auckland, New Zealand, January 2014This volume contains papers presented at the Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand, January 2014. Where indicated, the paper is available for download in PDF or Postscript format. The series is published by, and most papers are copyright of, the Australian Computer Society Inc. Reproduction for academic research and not-for-profit purposes is granted provided the copyright notice on the first page of each paper is included. | | | Acceptance Rate Information.The full papers in this volume were peer refereed, in full, by an international programme committee. The acceptance rate was 41.2% (7 from 17). |
Volume CitationUdaya Parampalli and Ian Welch Eds. (2014). Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014). CRPIT. 149. Auckland, New Zealand, ACS.
Papers Included in the VolumeMansoori, M., Welch, I. and Fu, Q. (2014). YALIH, Yet Another Low Interaction Honeyclient. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 7-15. |
| Kush,N., Ahmed, E., Branagan,M. and Foo, E. (2014). Poisoned GOOSE: Exploiting the GOOSE Protocol. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 17-22. |
| Alhamdan, A., Bartlett, H., Dawson, E., Simpson, L. and Wong, K. K. (2014). Weak key-IV Pairs in the A5/1 Stream Cipher. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 23-36. |
| Radke,K., Boyd, C., Nieto, J. G., Manulis, M. and Stebila, D. (2014). Formalising Human Recognition: a Fundamental Building Block for Security Proofs. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 37-45. |
| Seneviratne, J., Parampalli, U. and Kulik, L. (2014). An Authorised Pseudonym System for Privacy Preserving Location Proof Architectures. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 47-56. |
| Bhatia, S., Kush, N., Djamaludin, C., Akande, A. and Foo, E. (2014). Practical Modbus Flooding Attack and Detection. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 57-65. |
| Bajaj, K. and Pieprzyk, J. (2014). A Case Study of User-Level Spam Filtering. In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 67-75. |
| Teo, S., Wong, K. K., Bartlett, H., Simpson, L. and Dawson, E. (2014). Algebraic analysis of Trivium-like ciphers (Poster). In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 77-81. |
| Jayarathna, D., Tupakula, U. and Varadharajan, V. (2014). Hypervisor-based Security Architecture for Validating DNS Services (Poster). In Proc. Twelfth Australasian Information Security Conference (AISC 2014), Auckland, New Zealand. CRPIT, 149. Parampalli, U. and Welch, I. Eds., ACS. 83-86. |
|
Papers listed: 9
|