This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.Cambridge University Press, Cambridge (2008) Padmanabhan, B., Yang, Y.: Clickprints on the Web: Are there signatures in Web Browsing Data? ... Springer, Heidelberg (2009) Rieck, K., Laskov, P.: Language Models for Detection of Unknown Attacks in Network Traffic. ... The Definitive Guide: Storage and Analysis at Internet Scale, 2nd edn. ... Practical Machine Learning Tools and Techniques. ... ACM, New York (2007) Yang, Y.: Web user behavioral profiling for user identification.
|Title||:||Information Security and Privacy Research|
|Author||:||Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou|
|Publisher||:||Springer - 2012-06-06|