SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014)
-
The Problems of Investigation of Identity Theft in SNS
Investigation of identity theft is not an easy task. Electronic environment of the Internet makes the task even more difficult. The problem is complex and therefore it is worth to look at chosen ...Authors: Arkadiusz Lach
Year Published: Nov. 2014 | 1-6 | ICCICS2014 -
Cyber-Crimes in Iran: Definition and Analysis
The cyber-crime as a notorious phenomenon threats nation’s security and financial health. And due to the development of internet technology, computer systems offer some opportunities for law ...Authors: Mohsen Ghasemi Ariani, Fatemeh Sajedi
Year Published: Nov. 2014 | 7-10 | ICCICS2014 -
Cyber-Crimes in Iran: Definition and Analysis
The cyber-crime as a notorious phenomenon threats nation’s security and financial health. And due to the development of internet technology, computer systems offer some opportunities for law ...Authors: Mohsen Ghasemi Ariani, Fatemeh Sajedi
Year Published: Nov. 2014 | 7-10 | ICCICS2014 -
Security Issue on Cloned TrueCrypt Containers and Backup Headers
The growing concern of various entities with the confidentiality of the data ultimately fostered the development of tools for data protection at various levels, from a simple password protection ...Authors: Rodrigo de S. Ruiz, Fernando Pompeo Amatte, Kil Jin Brandini Park D. Sc.
Year Published: Nov. 2014 | 11-19 | ICCICS2014 -
A Protection Architecture for Malicious JavaScripts on Web Browsers
‘Web-based Cyber Attacks’ for leaking private information or making target system to denial of service (DoS) are arising. Traditional Web-based cyber attacks hide malwares in the Web pages ...Authors: Woung Jang, Jonghun Jung, Myoungsun Noh, Kyungho Jung, Chaetae Im
Year Published: Nov. 2014 | 20-23 | ICCICS2014 -
Security in Depth Requires Secure Programming Languages Too
Secure software development has received lots of attention in recent years due to the rise of security breaches attributed to software problems. There have been several studies that address ...Authors: Walid Al-Ahmad, Preeti Kolekar
Year Published: Nov. 2014 | 24-30 | ICCICS2014 -
DLP Technologies: Challenges and Future Directions
Currently, many vendors offer multiple data loss prevention solutions, but they need to cope with the challenges of the modern world like access control problem or social network analysis problem ...Authors: Ekaterina Pshehotskaya, Nikita Nikitinsky, Tamara Sokolova
Year Published: Nov. 2014 | 31-36 | ICCICS2014 -
Analysis of Slow Read DoS Attack and Countermeasures
The ideas and techniques of the DoS / DDoS Attack strategy become more effective and more complex. In our research, we focus on a Slow Read DoS Attack which is one of the sophisticated DoS ...Authors: Junhan Park, Keisuke Iwai, Hidema Tanak, Takakazu Kurokawa
Year Published: Nov. 2014 | 37-49 | ICCICS2014 -
Analysis of ISO27001 Implementation for Enterprises and SMEs in Indonesia
Implementation of information security management especially ISO27001 is still rare in developing countries, in order to know the readiness of company both large companies (enterprises) and small ...Authors: Candiwan Candiwan
Year Published: Nov. 2014 | 50-58 | ICCICS2014 -
WebKure: A Web Vulnerability Auditor
We live in a period of time where Information Security has gained much attention. The core purpose of the paper is to critically study and analyze the trends in information security as far as the ...Authors: Rana Jacob Jose, Khoo Li Jing
Year Published: Nov. 2014 | 59-68 | ICCICS2014 -
A Review: Network Forensic Analysis Framework in Infrastructure as a Services (IaaS) Cloud Computing Environment
Cloud computing technology offers new way in providing computing resources and applications on demand. This is exacerbated with the limitations in collecting forensic data from different ...Authors: Samsiah Ahmad, Zalikha Zulkifli
Year Published: Nov. 2014 | 69-81 | ICCICS2014