SeCIHD 2012 Program

 

August 20, 2012

Lecture Hall C, University of Economics in Prague, Czech Republic

 

SeCIHD1 [14:00-15:30] – Chair: Ilsun You (Korean Bible University, Republic of Korea)

 

-     Security-and-Privacy-Related Issues on IT Systems During Disasters
Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake

-     Mobile Malware Threats and Defenses for Homeland Security
Seung-Hyun Seo, Kangbin Yim, and Ilsun You

-     A Collaborative Approach to Botnet Protection Consensus Building and In-operation Assurance for Service Dependability
Yutaka Matsuno and Shuichiro Yamamoto

-     A Secure Distributed Video Surveillance System Based on Portable Devices
Pietro Albano, Andrea Bruno, Bruno Carpentieri, Aniello Castiglione, Arcangelo Castiglione, Francesco Palmieri, Raffaele Pizzolante, and Ilsun You

 

SeCIHD2 [16:00-17:30] – Chair: Aniello Castiglione (Universita' degli Studi di Salerno, Italy)

-     Network Profiling: Content Analysis of Users Behavior in Digital Communication Channel
Clara Maria Colombini, Antonio Colella, Marco Mattiucci, Aniello Castiglione

-     How to Forge a Digital Alibi on Mac OS X
Aniello Castiglione, Giuseppe Cattaneo, Roberto De Prisco, Alfredo De Santis, and Kangbin Yim

-     Discussion on the Challenges and Opportunities of Cloud Forensics
Rainer Poisel and Simon Tjoa

-     A Secure Data Encryption Method by Employing a Feedback Encryption Mechanism and Three- Dimensional Operation
Yi-Li Huang, Fang-Yie Leu and Cheng-Ru Dai

August 21, 2012

Lecture Hall C, University of Economics in Prague, Czech Republic

 

SeCIHD3 [11:00-12:30] – Chair: Kangbin Yim (SCH University, Republic of Korea)

 

-     Automatic Image Annotation using Semantic Text Analysis
Dongjin Choi and Pankoo Kim

-     Design and Analysis of a Fragile Watermarking Scheme Based on Block-Mapping
Munkhbaatar Doyoddorj and Kyung-Hyune Rhee

-     Detecting Unusual User Behaviour to Identify Hijacked Internet Auctions Accounts
Marek Zachara and Dariusz Palka

-     Facial Identity Encryption with Kinoform and Phase-key Watermarking for Homeland Security Agencies
Muhammad Naveed Iqbal Qureshi, Jin-Tae Kim, and Sang-Woong Lee

SeCIHD4 [14:00 - 15:30] – Chair: Christian Damsgaard Jensen (Technical University of Denmark, Denmark)

 

-     A formal support for collaborative data sharing
Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi and Luca Wiegand

-     Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures
Fredrik Seehusen and Bjørnar Solhaug

-     Towards a Logical Framework for Reasoning about Risk
Matteo Cristani, Erisa Karali, and Luca Vigano

-     A Collaborative Approach to Botnet Protection
Matija Stevanovic, Kasper Revsbech, Jens Myrup Pedersen, Robin Sharp, and Christian Damsgaard Jensen


SeCIHD5 [16:00 - 17:30] – Chair: Marek Ogiela (AGH University of Sci. and Tech., Poland)

 

-     Semantic Techniques of Image Retrieval - the Example of a Structural Analysis of Coronary Arteries
Miros©©aw Trzupek, Marek R. Ogiela

-     Evaluation of Carotid Artery Segmentation with Centerline Detection and Active Contours Without Edges Algorithm
Tomasz Hachaj and Marek R. Ogiela

-     Managing Urban Waste Collection through Timed Automata based Fuzzy Cognitive Maps
Giovanni Acampora, Vincenzo Loia and Autilia Vitiello

-     Routing Algorithm based on Nash Equilibrium against Malicious Attacks for DTN Congestion Control
Chengjun Wang, Baokang Zhao, Wanrong Yu, Chunqing Wu, and Zhenghu Gong