SDIWC Digital Library

The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.

The International Conference on Cyber-Crime Investigation and Cyber Security (ICCICS2014)

  • The Problems of Investigation of Identity Theft in SNS

    Investigation of identity theft is not an easy task. Electronic environment of the Internet makes the task even more difficult. The problem is complex and therefore it is worth to look at chosen ...
    Authors: Arkadiusz Lach
    Year Published: Nov. 2014 | 1-6 | ICCICS2014
  • Cyber-Crimes in Iran: Definition and Analysis

    The cyber-crime as a notorious phenomenon threats nation’s security and financial health. And due to the development of internet technology, computer systems offer some opportunities for law ...
    Authors: Mohsen Ghasemi Ariani, Fatemeh Sajedi
    Year Published: Nov. 2014 | 7-10 | ICCICS2014
  • Cyber-Crimes in Iran: Definition and Analysis

    The cyber-crime as a notorious phenomenon threats nation’s security and financial health. And due to the development of internet technology, computer systems offer some opportunities for law ...
    Authors: Mohsen Ghasemi Ariani, Fatemeh Sajedi
    Year Published: Nov. 2014 | 7-10 | ICCICS2014
  • Security Issue on Cloned TrueCrypt Containers and Backup Headers

    The growing concern of various entities with the confidentiality of the data ultimately fostered the development of tools for data protection at various levels, from a simple password protection ...
    Authors: Rodrigo de S. Ruiz, Fernando Pompeo Amatte, Kil Jin Brandini Park D. Sc.
    Year Published: Nov. 2014 | 11-19 | ICCICS2014
  • A Protection Architecture for Malicious JavaScripts on Web Browsers

    ‘Web-based Cyber Attacks’ for leaking private information or making target system to denial of service (DoS) are arising. Traditional Web-based cyber attacks hide malwares in the Web pages ...
    Authors: Woung Jang, Jonghun Jung, Myoungsun Noh, Kyungho Jung, Chaetae Im
    Year Published: Nov. 2014 | 20-23 | ICCICS2014
  • Security in Depth Requires Secure Programming Languages Too

    Secure software development has received lots of attention in recent years due to the rise of security breaches attributed to software problems. There have been several studies that address ...
    Authors: Walid Al-Ahmad, Preeti Kolekar
    Year Published: Nov. 2014 | 24-30 | ICCICS2014
  • DLP Technologies: Challenges and Future Directions

    Currently, many vendors offer multiple data loss prevention solutions, but they need to cope with the challenges of the modern world like access control problem or social network analysis problem ...
    Authors: Ekaterina Pshehotskaya, Nikita Nikitinsky, Tamara Sokolova
    Year Published: Nov. 2014 | 31-36 | ICCICS2014
  • Analysis of Slow Read DoS Attack and Countermeasures

    The ideas and techniques of the DoS / DDoS Attack strategy become more effective and more complex. In our research, we focus on a Slow Read DoS Attack which is one of the sophisticated DoS ...
    Authors: Junhan Park, Keisuke Iwai, Hidema Tanak, Takakazu Kurokawa
    Year Published: Nov. 2014 | 37-49 | ICCICS2014
  • Analysis of ISO27001 Implementation for Enterprises and SMEs in Indonesia

    Implementation of information security management especially ISO27001 is still rare in developing countries, in order to know the readiness of company both large companies (enterprises) and small ...
    Authors: Candiwan Candiwan
    Year Published: Nov. 2014 | 50-58 | ICCICS2014
  • WebKure: A Web Vulnerability Auditor

    We live in a period of time where Information Security has gained much attention. The core purpose of the paper is to critically study and analyze the trends in information security as far as the ...
    Authors: Rana Jacob Jose, Khoo Li Jing
    Year Published: Nov. 2014 | 59-68 | ICCICS2014
  • A Review: Network Forensic Analysis Framework in Infrastructure as a Services (IaaS) Cloud Computing Environment

    Cloud computing technology offers new way in providing computing resources and applications on demand. This is exacerbated with the limitations in collecting forensic data from different ...
    Authors: Samsiah Ahmad, Zalikha Zulkifli
    Year Published: Nov. 2014 | 69-81 | ICCICS2014