Abstract is missing.
- Quality of detectability (QoD) and QoD-aware AAT-based attack detectionJie Wang 0001, Raphael Chung-Wei Phan, John N. Whitley, David J. Parish. 1-6 [doi]
- An efficient identity-based proxy signcryption for secure broadcastYeojeong Yoon, Chanil Park, Pyung Kim, Seongoun Hwang, Hyunsoo Yoon. 1-6 [doi]
- Attacks to a lightweight RFID mutual authentication protocolMete Akgün, Ali Özhan Gürel, Mehmet Ufuk Çaglayan. 1-5 [doi]
- On security of multi-factor biometric authenticationHisham Al-Assam, Harin Sellahewa, Sabah Jassim. 1-6 [doi]
- Viability of multivariate cryptosystems for WSNPradheepkumar Singaravelu, Shekhar Verma. 1-6 [doi]
- Semi-passive RFID development platform for implementing and attacking security tagsMartin Feldhofer, Manfred Josef Aigner, Thomas Baier 0002, Michael Hutter, Thomas Plos, Erich Wenger. 1-6 [doi]
- Accessing sensitive patient information in ubiquitous healthcare systemsZanifa Omary, Fredrick Mtenzi, Bing Wu, Ciaran O'Driscoll. 1-3 [doi]
- New authentication protocol for IP CAS of IPTVK. Alghafli, Chan Yeob Yeun. 1-6 [doi]
- SOAP message-based steganographyBachar Alrouh, Adel Almohammad, Gheorghita Ghinea. 1-6 [doi]
- Workflow access control: From role engineering to task engineeringHamid Hatim, Hanane El Bakkali, Ilham Berrada. 1-7 [doi]
- Evasion technique and detection of malicious botnetDae-il Jang, Kang-yu Cho, Minsoo Kim, Hyun-Chul Jung, Bong-Nan Noh. 1-5 [doi]
- On the efficient indexing of ordered multidimensional tuplesFilip Krizka, Michal Krátký. 1-8 [doi]
- TCvisor: A hypervisor level secure storageM. Rezaei, Nafise Sadat Moosavi, Hamed Nemati, Reza Azmi. 1-9 [doi]
- Mining uncertain data warehouseK. A. ElDahshan, Hany M. S. Lala. 1-7 [doi]
- The cost of security for a completely private ubiquitous environmentCiaran O'Driscoll, Paul Doyle. 1-2 [doi]
- Mutual exclusion and role inheritance affecting least privilege in RBACMuhammad Asif Habib. 1-6 [doi]
- Distributed timestamping with smart cards using efficient overlay routingGuenther Starnberger, Lorenz Froihofer, Karl M. Goeschka. 1-6 [doi]
- A new method of hardware firewall implementation on SOCSaeed Ezzati, Hamid Reaza Naji, Amir Chegini, Payam Habibimehr. 1-7 [doi]
- Improving community rating in the tele-lecturing contextFranka Moritz, Maria Siebert, Christoph Meinel. 1-6 [doi]
- Chaos based fragile watermarking algorithm for JPEG imagesDaniel Caragata, Anca Livia Radu, Safwan El Assad, Cristian-Gabriel Apostol. 1-7 [doi]
- A bio-inspired framework for wireless sensor network using mobile sensorsV. Ponnusamy, Azween Vitra Abdullah. 1-6 [doi]
- NFC loyal: A beneficial model to promote loyalty on smart cards of mobile devicesBusra Ozdenizci, Vedat Coskun, Mehmet N. Aydin, O. Kerem. 1-6 [doi]
- Unsupervised email vector space model (UEVSM)Taiwo Ayodele. 1-5 [doi]
- Remote-to-Local attacks detection using incremental genetic algorithmSafdar Ali, Waseem Shahzad, Farrukh Aslam Khan. 1-6 [doi]
- An automated payment system for car parks based on Near Field Communication technologyGiuliano Benelli, Alessandro Pozzebon. 1-6 [doi]
- Detection of botnet collusion by degree distribution of domainsPieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips. 1-8 [doi]
- Diagrammatical framework for information system attacksSabah S. Al-Fedaghi. 1-7 [doi]
- Inter-organizational trust and supply chain Flexibility: From a relational view of the firmFuchun Zhao, Hong Ling, Zhengchuan Xu. 1-5 [doi]
- Statistical syllables selection approach for the preparation of Punjabi speech databaseParminder Singh, G. S. Lehal. 1-4 [doi]
- The effects of encryption on VoIP streams under the code-excited linear prediction coder G.729Gregory Epiphaniou, Carsten Maple, Paul Sant, Peter Norrington. 1-6 [doi]
- Fast and accurate detection for polymorphic wormsMohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura, Mohsin Hashim, Eihab Bashier. 1-6 [doi]
- Semantic image annotation with social contextNajeeb Elahi, Randi Karlsen, Waqas Younas. 1-7 [doi]
- Toward an agent based approach for decisional systems modelingB. Abdelhaq, El Fazziki Abdelaziz, Ait Ouahman Abdallah, Ibourk Aomar. 1-8 [doi]
- A robust and flexible test environment for VoIP security testsMaximilian Ronniger, Florian Fankhauser, Christian Schanes, Thomas Grechenig. 1-6 [doi]
- E-government evaluation: The case of e-procurement in Malaysia governmentAini Aman, Hasmiah Kasimin. 1-6 [doi]
- IT governance in e-commerce environment: Cases from airline industryManar Iskandar, Noor Akma Mohd Salleh. 1-6 [doi]
- Enriching E-Learning meta data with user generated playlistsMaria Siebert, Franka Moritz, Frank Hambach, Christoph Meinel. 1-6 [doi]
- Information security awareness in UAE: A survey paperFadi A. Aloul. 1-6 [doi]
- Charging of SAML-based federated VoIP servicesDavid J. Lutz, Dominik Lamp, Patrick Mandic, Fabio Victora Hecht, Burkhard Stiller. 1-8 [doi]
- A fuzzy recommender system for dynamic prediction of user's behaviorS. Nadi, Mohamadhosein Hussein Saraee, Mohamad Davarpanah Jazi. 1-5 [doi]
- Secure group communications for Delay-Tolerant NetworksPaul T. Edelman, Michael J. Donahoo, David B. Sturgill. 1-8 [doi]
- Survey of SCADA security challenges and potential attack vectorsRobert E. Johnson III. 1-5 [doi]
- Ownership transfer protocolAbdullah Mohammed Alaraj. 1-6 [doi]
- Link signal strength based path selection scheme for ad hoc networksUsha Jayahkudy, Chong Eng Tan. 1-6 [doi]
- Design of secure key agreement protocol for pairing in RF4CEKyusuk Han, Hyeran Mun, Taeshik Shon. 1-5 [doi]
- Lossless R-tree compression using variable-length codesPeter Chovanec, Michal Krátký, Jirí Walder. 1-8 [doi]
- Measuring the user experience of digital books with children: An eyetracking study of interaction with digital librariesAreej Al-Wabil, Ebtisam Alabdulqader, Latifa Al-Abdulkarim, Nora Al-Twairesh. 1-7 [doi]
- Remote to Local attack detection using supervised neural networkIftikhar Ahmad, Azween Vitra Abdullah, Abdullah Sharaf Alghamdi. 1-6 [doi]
- Near Field Communication in the development of ubiquitous gamesPilar Castro Garrido, Guillermo Matas Miraz, Irene Luque Ruiz, Miguel Ángel Gómez-Nieto. 1-7 [doi]
- Enhancement of anonymous authentication scheme in wireless sensor networkHyeran Mun, Chan Yeob Yeun, Kyusuk Han, Byung-Ho Chung. 1-4 [doi]
- Distributed PCA-based anomaly detection in wireless sensor networksMohammad Ahmadi Livani, Mahdi Abadi. 1-8 [doi]
- A conceptual framework providing Direct Anonymous Attestation (DAA) protocol in trusted location-based services (LBS)Hanunah Othman, Habibah Hashim, Jamalul-lail Ab Manan. 1-7 [doi]
- SRS-based automatic secure device pairing on audio channelsYoung-Sam Kim, Seung-Hyun Hyun Kim, Seung-Hun Hun Jin. 1-6 [doi]
- Gossip membership protocol for peer-to-peer streaming overlay constructionIon Bica, Mihai Togan, Stefan-Vladimir Ghita. 1-5 [doi]
- A multi-agent scanner to detect stored-XSS vulnerabilitiesElena Castro Gálan, Almudena Alcaide, Agustín Orfila, Jorge Blasco Alís. 1-6 [doi]
- A contextual multilevel access control model with default and exception description logicBoustia Narhimene, Aïcha Mokhtari. 1-6 [doi]
- Design science in NFC researchBusra Ozdenizci, Mehmet N. Aydin, Vedat Coskun, O. Kerem. 1-6 [doi]
- Strictly alphanumeric data: Improving privacy in smart environmentsDennis Lupiana, Fredrick Mtenzi, Ciaran O'Driscoll, Brendan O'Shea. 1-3 [doi]
- Optimising Quality of Service through the controlled aggregation of trafficM. E. Culverhouse, Bogdan V. Ghita, Paul L. Reynolds, Xingang Wang. 1-7 [doi]
- Strategic and intelligent smart grid systems engineeringEmmanuel Hooper. 1-6 [doi]
- An investigation into cloud configuration and securityKatie Wood, Ella Pereira. 1-6 [doi]
- On a FPGA implementation of BCH codesLaurentiu Ionescu, Constantin Anton, Ion Tutanescu, Alin Mazare, Gheorghe Serban. 1-5 [doi]
- Defending privacy: The development and deployment of a darknetConor Mc Manamon, Fredrick Mtenzi. 1-6 [doi]
- Sentiment Classification of text reviews using novel feature selection with reduced over-fittingV. Siva RamaKrishna Reddy, Durvasula V. L. N. Somayajulu, Ajay R. Dani. 1-2 [doi]
- Reconsidering Ryu-Takagi RFID authentication protocolDang Nguyen Duc, Kwangjo Kim, Chan Yeob Yeun. 1-6 [doi]
- A Virtualized Environment Security (VES) model for a secure virtualized environmentAnnette Tolnai, Sebastiaan H. von Solms. 1-6 [doi]
- Combating web plagiarism and improving internet safety by authenticating web contentVivek Pathak. 1-6 [doi]
- Cryptographically secure pseudo-random bit generator for RFID tagsPedro Peris-Lopez, Enrique San Millán, Jan C. A. van der Lubbe, Luis Entrena. 1-6 [doi]
- Web 2.0 content extractionMohannmad Waqar, Zeeshan Shafi Khan. 1-3 [doi]
- Cognitive parameters based seller agent selection in B2C E-CommerceRavi Bhushan Mishra, Bireshwar Dass Mazumdar. 1-3 [doi]
- Trusted Computing enhanced OpenIDAndreas Leicher, Andreas U. Schmidt, Yogendra Shah, Inhyok Cha. 1-8 [doi]
- A Web Services security policy assistantTristan Lavarack, Marijke Coetzee. 1-6 [doi]
- Passive RFID technology for the internet of thingsSandra Dominikus, Manfred Josef Aigner, Stefan Kraxberger. 1-8 [doi]
- Secure multimedia communication in wireless mesh networksFazl-e Hadi, Fahad Bin Muhaya, Atif R. Naseer. 1-4 [doi]
- Genetic algorithm based rainbow network flow optimization for multiple description coding in lossy networkHuseyin Kusetogullari, Amir Yavariabdi, Mark S. Leeson, Evor L. Hines. 1-6 [doi]
- Display security for online transactions: SMS-based authentication schemeMohammed Alzomai, Bander AlFayyadh, Audun Jøsang. 1-7 [doi]
- A Grid-based e-learning model for Open UniversitiesOnyeka Emebo, Olawande Daramola, Charles Ayo. 1-4 [doi]
- Secure single packet IP Traceback mechanism to identify the sourceZeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad Sher, Rashid Mehmood. 1-5 [doi]
- Cerebrovascular diseases research based on heterogeneous medical data mining and knowledge baseP. Vcelck, Jana Klecková, Vladimir Rohan. 1-6 [doi]
- Privacy metrics in ubiquitous computing applicationsSaid Jafari, Fredrick Mtenzi, Ciaran O'Driscoll, Ronan Fitzpatrick, Brendan O'Shea. 1-2 [doi]
- Cloud computing: Forensic challenges for law enforcementDenis J. Reilly, Chris Wren, Tom Berry. 1-7 [doi]
- Secure information extraction from clinical documents using SNOMED CT gazetteer and natural language processingSaman Hina, Eric Atwell, Owen Johnson. 1-5 [doi]
- Comparative study of neural networks and k-means classification in web usage miningPrakash S. Raghavendra, Shreya Roy Chowdhury, Srilekha Vedula Kameswari. 1-7 [doi]