Abstract is missing.
- Collective Classification for Spam FilteringCarlos Laorden, Borja Sanz, Igor Santos, Patxi Galán-García, Pablo Garcia Bringas. 1-8 [doi]
- Detecting Bad-Mouthing Attacks on Reputation Systems Using Self-Organizing MapsZorana Bankovic, Juan Carlos Vallejo, David Fraga, José Manuel Moya. 9-16 [doi]
- Approach Based Ensemble Methods for Better and Faster Intrusion DetectionEmna Bahri, Nouria Harbi, Hoa Nguyen Huu. 17-24 [doi]
- Application of the Generic Feature Selection Measure in Detection of Web AttacksHai Thanh Nguyen, Carmen Torrano-Gimenez, Gonzalo Álvarez, Slobodan Petrovic, Katrin Franke. 25-32 [doi]
- Data Aggregation Based on Fuzzy Logic for VANETsPino Caballero-Gil, Jezabel Molina-Gil, Cándido Caballero-Gil. 33-40 [doi]
- Digging into IP Flow Records with a Visual Kernel MethodCynthia Wagner, Gérard Wagener, Radu State, Thomas Engel. 41-49 [doi]
- Opcode-Sequence-Based Semi-supervised Unknown Malware DetectionIgor Santos, Borja Sanz, Carlos Laorden, Felix Brezo, Pablo Garcia Bringas. 50-57 [doi]
- A New Alert Correlation Algorithm Based on Attack GraphSebastian Roschke, Feng Cheng 0002, Christoph Meinel. 58-67 [doi]
- A Qualitative Survey of Active TCP/IP Fingerprinting Tools and Techniques for Operating Systems IdentificationJoão Paulo S. Medeiros, Agostinho de Medeiros Brito Jr., Paulo S. Motta Pires. 68-75 [doi]
- Security Alert Correlation Using Growing Neural GasFrancisco José Mora-Gimeno, Francisco Maciá Pérez, Iren Lorenzo-Fonseca, Juan Antonio Gil-Martínez-Abarca, Diego Marcos-Jorquera, Virgilio Gilart-Iglesias. 76-83 [doi]
- A Comparative Performance Evaluation of DNS Tunneling ToolsAlessio Merlo, Gianluca Papaleo, Stefano Veneziano, Maurizio Aiello. 84-91 [doi]
- Security Analysis and Complexity Comparison of Some Recent Lightweight RFID ProtocolsEhsan Vahedi, Rabab K. Ward, Ian F. Blake. 92-99 [doi]
- A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer NetworkJaydip Sen. 100-108 [doi]
- Testing Ensembles for Intrusion Detection: On the Identification of Mutated Network ScansSilvia González, Javier Sedano, Álvaro Herrero, Bruno Baruque, Emilio Corchado. 109-117 [doi]
- An Intelligent Information Security Mechanism for the Network Layer of WSN: BIOSARPKashif Saleem, Norsheila Fisal, Sharifah Hafizah Syed Ariffin, Rozeha A. Rashid. 118-126 [doi]
- A Multisignature Scheme Based on the SDLP and on the IFPRaúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué. 135-142 [doi]
- A Group Signature Scheme Based on the Integer Factorization and the Subgroup Discrete Logarithm ProblemsRaúl Durán Díaz, Luis Hernández Encinas, Jaime Muñoz Masqué. 143-150 [doi]
- Keeping Group Communications Private: An Up-to-Date Review on Centralized Secure MulticastJ. A. M. Naranjo, L. G. Casado. 151-159 [doi]
- Java Card Implementation of the Elliptic Curve Integrated Encryption Scheme Using Prime and Binary Finite FieldsV. Gayoso Martínez, Luis Hernández Encinas, Carmen Sánchez Ávila. 160-167 [doi]
- Comprehensive Protection of RFID Traceability Information Systems Using Aggregate SignaturesGuillermo Azuara, José Luis Salazar. 168-176 [doi]
- Cryptanalysis of Multicast Protocols with Key Refreshment Based on the Extended Euclidean AlgorithmAlberto Peinado, Andrés Ortiz. 177-182 [doi]
- Improving the Message Expansion of the Tangle Hash FunctionRafael Álvarez, José-Francisco Vicent, Antonio Zamora. 183-189 [doi]
- Cryptosystem with One Dimensional Chaotic MapsJ. A. Martínez-Ñonthe, A. Díaz-Méndez, M. Cruz-Irisson, L. Palacios-Luengas, J. L. Del-Río-Correa, R. Vázquez-Medina. 190-197 [doi]
- A Quantitative Analysis into the Economics of Correcting Software BugsCraig S. Wright, Tanveer A. Zia. 198-205 [doi]
- Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security ControlsCraig S. Wright, Tanveer A. Zia. 206-213 [doi]
- An Approach for Adapting Moodle into a Secure InfrastructureJesus Diaz, David Arroyo, Francisco B. Rodriguez. 214-221 [doi]
- On Secure JAVA Application in SOA-Based PKI Mobile Government SystemsMilan Markovic, Goran Dordevic. 222-229 [doi]
- Structural Feature Based Anomaly Detection for Packed Executable IdentificationXabier Ugarte-Pedrero, Igor Santos, Pablo Garcia Bringas. 230-237 [doi]
- Produre: A Novel Proximity Discovery Mechanism in Location Tagging SystemJian-bin Hu, Yonggang Wang, Tao Yang, Zhi Guan, Nike Gui, Zhong Chen. 238-245 [doi]
- Scientific Gateway and Visualization ToolEva Pajorova, Ladislav Hluchý. 246-250 [doi]
- An Innovative Framework for Securing Unstructured DocumentsFlora Amato, Valentina Casola, Antonino Mazzeo, Sara Romano. 251-258 [doi]
- Use of Schema Associative Mapping for Synchronization of the Virtual Machine Audit LogsSean S. E. Thorpe, Indrajit Ray, Tyrone Grandison. 259-264 [doi]
- Enforcing Data Quality Rules for a Synchronized VM Log Audit Environment Using Transformation Mapping TechniquesSean S. E. Thorpe, Indrajit Ray, Tyrone Grandison. 265-271 [doi]
- Evaluating User-Centered Privacy Model (UPM) in Pervasive Computing SystemsAli Dehghantanha, Nur Izura Udzir, Ramlan Mahmod. 272-284 [doi]
- An Innovative Linkage Learning Based on Differences in Local OptimumsHamid Parvin, Behrouz Minaei-Bidgoli, B. Hoda Helmi. 285-292 [doi]
- A New Particle Swarm Optimization for Dynamic EnvironmentsHamid Parvin, Behrouz Minaei, Sajjad Ghatei. 293-300 [doi]
- A Classifier Ensemble for Face Recognition Using Gabor Wavelet FeaturesHamid Parvin, Nasser Mozayani, Akram Beigi. 301-307 [doi]