Abstract is missing.
- Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor NetworksEirini Karapistoli, Anastasios A. Economides. 1-18 [doi]
- Secure and Verifiable Top-k Query in Two-Tiered Sensor NetworksTing Zhou, Yaping Lin, Wei Zhang, Sheng Xiao, Jinguo Li. 19-34 [doi]
- CamTalk: A Bidirectional Light Communications Framework for Secure Communications on SmartphonesMengjun Xie, Liang Hao, Kenji Yoshigoe, Jiang Bian. 35-52 [doi]
- Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication BotnetsXiang Cui, Binxing Fang, Jinqiao Shi, Chaoge Liu. 53-68 [doi]
- Contrasting Permission Patterns between Clean and Malicious Android ApplicationsVeelasha Moonsamy, Jia Rong, Shaowu Liu, Gang Li, Lynn Margaret Batten. 69-85 [doi]
- DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in AndroidYousra Aafer, Wenliang Du, Heng Yin. 86-103 [doi]
- Disabling a Computer by Exploiting Softphone Vulnerabilities: Threat and MitigationRyan Farley, Xinyuan Wang. 104-121 [doi]
- VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud ComputingJun Jiang, Meining Nie, Purui Su, Dengguo Feng. 122-139 [doi]
- Integrated Security Architecture for Virtual MachinesVijay Varadharajan, Udaya Kiran Tupakula. 140-153 [doi]
- Generic Mediated EncryptionIbrahim F. Elashry, Yi Mu, Willy Susilo. 154-168 [doi]
- An Efficient Reconfigurable II-ONB Modular MultiplierMiao Li, Liangsheng He, Tongjie Yang, Neng Gao, Zongbin Liu, Qinglong Zhang. 169-181 [doi]
- Public-Key Encryption Resilient to Linear Related-Key AttacksHui Cui, Yi Mu, Man Ho Au. 182-196 [doi]
- Clonewise - Detecting Package-Level Clones Using Machine LearningSilvio Cesare, Yang Xiang, Jun Zhang. 197-215 [doi]
- Automatic Polymorphic Exploit Generation for Software VulnerabilitiesMinghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng. 216-233 [doi]
- A Novel Web Tunnel Detection Method Based on Protocol BehaviorsFei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang. 234-251 [doi]
- Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least PrivilegeNiels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens. 252-269 [doi]
- Scalable Security Model Generation and Analysis Using k-importance MeasuresJin B. Hong, Dong Seong Kim. 270-287 [doi]
- The B-Side of Side Channel Leakage: Control Flow Security in Embedded SystemsMehari Msgna, Konstantinos Markantonakis, Keith Mayes. 288-304 [doi]
- An e-payment Architecture Ensuring a High Level of Privacy ProtectionAude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, Christophe Rosenberger. 305-322 [doi]
- Unveiling Privacy Setting Breaches in Online Social NetworksXin Ruan, Chuan Yue, Haining Wang. 323-341 [doi]
- Securing a Web-Based Anti-counterfeit RFID SystemBelal Chowdhury, Morshed U. Chowdhury, Jemal Abawajy. 342-355 [doi]
- Security Concerns and Remedy in a Cloud Based E-learning SystemMd. Anwar Hossain Masud, Md. Rafiqul Islam, Jemal Abawajy. 356-366 [doi]
- Ensuring Data Integrity by Anomaly Node Detection during Data Gathering in WSNsQuazi Mamun, Rafiqul Islam, Mohammed Kaosar. 367-379 [doi]
- (k - n) Oblivious Transfer Using Fully Homomorphic Encryption SystemMohammed Kaosar, Quazi Mamun, Rafiqul Islam, Xun Yi. 380-392 [doi]
- Detection of Android API Call Using Logging Mechanism within Android FrameworkYuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai. 393-404 [doi]
- Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column TransformWafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan. 405-417 [doi]