Abstract is missing.
- Study on the robustness to retyping attacks of fingerprinted digital documents in the frequential domainMario Diego Munoz-Hernandez, Jose Juan Garcia Hernandez, Miguel Morales-Sandoval. 25-30 [doi]
- Efficient multicore implementation of an advanced generator of discrete chaotic sequencesKarol Desnos, Safwan El Assad, Aurore Arlicot, Maxime Pelcat, Daniel Menard. 31-36 [doi]
- G-interval method for secure chaotic synchronization and information transmissionSimona Petrakieva, Oleg Garasym, Ina Taralova. 37-42 [doi]
- Survey of network access security in UMTS/LTE networksDaniel Caragata, Safwan El Assad, Kassem Ahmad. 43-46 [doi]
- A robust audio fingerprinting method using spectrograms saliency mapsZ. Jezabel Guzman Zavaleta, Claudia Feregrino Uribe, Alejandra Menendez-Ortiz, Jose Juan Garcia Hernandez. 47-52 [doi]
- 3-Sched - A cache covert channel robust cloud computing schedulerJohann Betz, Dirk Westhoff. 54-60 [doi]
- Security policy specification templates for critical infrastructure services in the cloudManuel Rudolph, Reinhard Schwarz, Christian Jung. 61-66 [doi]
- Avoiding security integration pitfalls in the cloudOliver Pfaff, Sebastian Ries. 67-70 [doi]
- Towards E-democracy in the middle east: E-voting adoptionMohammad Kamel Alomari. 73-77 [doi]
- Security challenges of E-government adoption based on end users' perspectiveNawaf Alharbi, Maria Papadaki, Paul Dowland. 78-82 [doi]
- Visual explanation of government-data for policy making through open-data inclusionDirk Burkhardt, Kawa Nazemi, Wilhelm Retz, Jörn Kohlhammer. 83-89 [doi]
- Value oriented service designing for successful e-HealthGilmini Dantanarayana, Prasad Jayaweera. 90-94 [doi]
- Preserving privacy in sensor-fog networksSaurabh Kulkarni, Shayan Saha, Ryler Hockenbury. 96-99 [doi]
- Combined security framework for multi-cloud environmentSuresh Kumar Aditya, Kavya Premkumar, R. Anitha 0001, Saswati Mukherjee. 100-105 [doi]
- Mitigating DoS to authenticated cloud REST APIsRegio A. Michelin, Avelino F. Zorzo, Cesar A. De Rose. 106-111 [doi]
- Secure virtualised environmentPushpinder-Kaur Chouhan, Sakir Sezer, Yangseo Choi, Ikkyun Kim, Chunghwan Jung. 112-117 [doi]
- Creation of educative content on the webBrika Ammar, Nader Fahima. 119-124 [doi]
- Highly available, consistent, business rule filtersAspen Olmsted, RoxAnn H. Stalvey. 125-130 [doi]
- Semantic variability modeling in business processes: A comparative studyLoubna El Faquih, Hanae Sbaï, Mounia Fredj. 131-136 [doi]
- Recommendation systems for software engineering: A survey from software development life cycle phase perspectiveUdsanee Pakdeetrakulwong, Pornpit Wongthongtham, Waralak V. Siricharoen. 137-142 [doi]
- Model for analysing Anti-Phishing Authentication CeremoniesEdina Hatunic-Webster, Fredrick Mtenzi, Brendan O'Shea. 144-150 [doi]
- Data concealing of supply chain transactions using the Distributed Trust BackbonePotchara Pruksasri, Jan van den Berg, Wout Hofman, Yaohua Tan. 151-156 [doi]
- Android forensics: Correlation analysisDimitrios Kasiaras, Thomas Zafeiropoulos, Nathan L. Clarke, Georgios Kambourakis. 157-162 [doi]
- Security information sharing for smart grids: Developing the right data modelRafal Leszczyna, Michal R. Wrobel. 163-169 [doi]
- ESTADO - Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission onlineChristian M. Lesjak, Thomas Ruprechter, Holger Bock, Josef Haid, Eugen Brenner. 171-177 [doi]
- Load management model for cloud computingSurabhi Mour, Priyansh Srivastava, Payal Patel, Hari Ram, Bhavesh N. Gohil, Dhiren R. Patel. 178-184 [doi]
- A context broker federation for QoC-driven selection of cloud-based context servicesElarbi Badidi. 185-190 [doi]
- A new technique to partition and manage data security in cloud databasesOsama M. Ben Omran, Brajendra Panda. 191-196 [doi]
- Improving deception in honeynet: Through data manipulationBoniface Kayode Alese, R. A. Akingbola, F. M. Dahunsi, O. S. Adewale, T. J. Ogundele. 198-204 [doi]
- Decision support and data mining for direct consumer-to-consumer tradingVincent Chan, Tony Hao Wu, Grantham Pang. 205-208 [doi]
- PPAMH: A novel privacy-preserving approach for mobile healthcareSouad Sadki, Hanan El Bakkali. 209-214 [doi]
- Characterizing social networks based on interior processes of nodesSabah Al-Fedaghi, Heba Al Meshari. 215-221 [doi]
- Using classification techniques for creation of predictive intrusion detection modelAbdulrazaq Almutairi, David J. Parish. 223-228 [doi]
- Traffic generator based on behavioral patternMatej Kacic, Daniel Ovsonka, Petr Hanácek, Maros Barabas. 229-223 [doi]
- Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a caseTiwalade Adelola, Ray Dawson, Firat Batmaz. 234-239 [doi]
- Security audit of data flows across enterprise systems and networksNikolai Joukov, Vladislav Shorokhov, Dmytro Tantsuyev. 240-247 [doi]
- A conceptual analysis of information security education, information security training and information security awareness definitionsEric Amankwa, Marianne Loock, Elmarie Kritzinger. 248-252 [doi]
- Enabling consumers to self-verify authenticity of productsAntonia Rana, Andrea Ciardulli. 254-255 [doi]
- Reinforcement learning-based trust and reputation model for cluster head selection in cognitive radio networksMee Hong Ling, Kok-Lim Alvin Yau. 256-261 [doi]
- Implementation aspects of software guards: A case studyAndré A. Osti, Bruno Alves Pereira Botelho, Nelson Uto. 262-267 [doi]
- Using query frequencies in tree-based revocation for certificateless authentication in VANETsPino Caballero-Gil, Francisco Martín-Fernández, Cándido Caballero-Gil. 268-273 [doi]
- Towards a model on security challenges during closed source software to OSS migrationsOlusegun Ademolu Ajigini, John A. van der Poll, Jan H. Kroeze. 274-283 [doi]
- Image hiding in speech spectrumFatiha Djebbar, Beghdad Ayad. 285-287 [doi]
- Multi-level access priority channel allocation strategies in Global System for Mobile communications (GSM) networksBamidele Moses Kuboye, Boniface Kayode Alese, Olumide Sunday Adewale. 288-294 [doi]
- A replication model for students' result processingOtasowie Iyare, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese. 295-301 [doi]
- Graphical and text based challenge questions for secure and usable authentication in online examinationsAbrar Ullah, Hannan Xiao, Trevor Barker, Mariana Lilley. 302-308 [doi]
- NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS trafficIvan Homoliak, Daniel Ovsonka, Matej Grégr, Petr Hanácek. 310-317 [doi]
- Performance and economies of 'bot-less' application-layer DDoS attacksNatalija Vlajic, Armin Slopek. 318-323 [doi]
- Time cost evaluation of trust based access control for XML databasesNorah Farooqi, Siobhán North. 324-326 [doi]
- Software solutions for high-security voice and data communication for smartphonesPatrick Dressler, Daniel Fischer, Bernd Markscheffel. 327-332 [doi]
- Automation of detection of security vulnerabilities in web services using dynamic analysisRahul Kumar, Indraveni K, Aakash Kumar Goel. 334-336 [doi]
- A prediction model based on Big Data analysis using hybrid FCM clusteringSeokhwan Yang, Jaechun Kim, Mokdong Chung. 337-339 [doi]
- ohStore: Ontology hierarchy solution to improve RDF data managementSaleh Albahli, Austin Melton. 340-348 [doi]
- Detection of repackaged Android MalwareHossain Shahriar, Victor Clincy. 349-354 [doi]
- Barefoot morphology: A person unique feature for forensic identificationF. Y. Osisanwo, A. O. Adetunmbi, Boniface Kayode Alese. 356-359 [doi]
- Large-scale network packet analysis for intelligent DDoS attack detection developmentKeisuke Kato, Vitaly Klyuev. 360-365 [doi]
- A chaos-based authentication and key management scheme for M2M communicationWided Boubakri, Walid Abdallah, Noureddine Boudriga. 366-371 [doi]
- Empirical study of automatic dataset labellingFrancisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, David J. Parish. 372-378 [doi]
- An Attribute-Based Signature using rivest shamir adleman schemeL. A. Nwosu, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese, O. Obe. 380-386 [doi]
- Evaluation of information security risks using hybrid assessment modelBoniface Kayode Alese, O. Oyebade, A. Osuolale Festus, Otasowie Iyare, Aderonke Favour-Bethy Thompson. 387-395 [doi]
- Optimal MTU for realtime video broadcast with packet loss - A QoE perspectiveOmer Nawaz, Tahir Nawaz Minhas, Markus Fiedler. 396-401 [doi]
- Advanced encryption standard development based quantum key distributionOmer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem. 402-408 [doi]
- Modeling anonymous human behavior using social mediaShruti Kohli, Ankit Gupta. 409-412 [doi]
- Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked dataMuhammad Ali Yousuf, Fatimah Y. Akeel, Nawfal F. Fadhel, Gary B. Wills. 414-419 [doi]
- Exposing data leakage in Data Integration SystemsFatimah Y. Akeel, Gary B. Wills, Andrew M. Gravell. 420-425 [doi]
- Computing domains reputation using flowIgor Mishsky, Nurit Gal-Oz, Ehud Gudes. 426-431 [doi]
- An applied methodology for information security and assurance: A study case for cloud computingRicardo Villalón-Fonseca, Braulio J. Solano-Rojas, Gabriela Marín Raventós. 432-439 [doi]
- Scaling IPv6 address bindings in support of a moving target defenseChristopher Morrell, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront. 440-445 [doi]
- CBAC4C: Conflict Based Allocation Control for CloudM. T. Dlamini, Jan H. P. Eloff, Mariki M. Eloff. 447-448 [doi]
- A robust multicast authentication scheme based on asymmetric key signatureA. Opayinka Christianah, Boniface Kayode Alese, Aderonke Favour-Bethy Thompson, D. Alowolodu Olufunso, A. Osuolale Festus. 449-458 [doi]
- A survey of cloud computing taxonomies: Rationale and overviewFahad Polash, Abdullah Abuhussein, Sajjan G. Shiva. 459-465 [doi]
- Architectural framework proposed of behavioural classroom simulation based second life environmentFahad Alotaibi. 466-470 [doi]
- Performance analysis of Hadoop MapReduce on an OpenNebula cloud with KVM and OpenVZ virtualizationsPedro Roger Magalhães Vasconcelos, Gisele Azevedo de Araújo Freitas. 471-476 [doi]