Abstract is missing.
- The use of mobile devices in authenticationRon Poet. 5 [doi]
- Record linkage applications in health services research: opportunities and challengesRamakrishna Thurimella, Rinku Dewri, William Mitchell. 6 [doi]
- Lightweight cryptography: modern development paradigmsAlexey Zhukov. 7 [doi]
- Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimationIgor Anikin, Lilia Yu. Emaletdinova. 8-11 [doi]
- Analysis of the impact of ethical issues on the management of the access rightsAndré Rifaut, Christophe Feltus, Slim Turki, Djamel Khadraoui. 12-19 [doi]
- sandFOX: secure sandboxed and isolated environment for firefox browserAnil Saini, Manoj Singh Gaur, Vijay Laxmi, Priyadarsi Nanda. 20-27 [doi]
- Modern techniques of function-level fault tolerance in MFM-systemsAlexander Tarasov. 28-29 [doi]
- Modern trends in the regulatory framework of the information security compliance assessment in Russia based on common criteriaAlexander Barabanov, Alexey Markov. 30-33 [doi]
- Problems of data protection in industrial corporations enterprise architectureVladimir V. Glukhov, Igor V. Ilin, A. B. Anisiforov. 34-37 [doi]
- Secure e-Learning portal for teaching business continuity and information security managementNatalia G. Miloslavskaya, Alexander I. Tolstoy, Vladislav Petrov. 38-41 [doi]
- Access control model D-TBAC subject to the requirements to tasks' performingSergey Lapin. 42-45 [doi]
- An analytical processing approach to supporting cyber security compliance assessmentFrancesco Buccafurri, Lidia Fotia, Angelo Furfaro, Alfredo Garro, Matteo Giacalone, Andrea Tundis. 46-53 [doi]
- Building data in motion DLP system from scratch using opensource software and confirming its effectiveness within "capture the flag" competitionsArtem Garkusha. 54-57 [doi]
- A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cardsSubhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia. 58-64 [doi]
- Absolute key variation technique of automatic variable key in cryptographyRajat Subhra Goswami, Subhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia. 65-67 [doi]
- Improved trust based key management for end-to-end secure communication in cellular networksNaila Mukhtar, M. S. Baig, L. A. Khan. 68-75 [doi]
- Secure voice communication system with hardware encryption of data on hands-free headsetA. Yu. Boruchinkin. 76-79 [doi]
- Cryptanalysis of factoring-based fully homomorphic encryptionLudmila K. Babenko, Alina Trepacheva. 80-83 [doi]
- Execution of data-dependent programs over encrypted dataPhilipp Burtyka, Oleg B. Makarevich. 84-89 [doi]
- Improvement of treeless signature schemes implementation by random oracle bufferingMaxim Anikeev. 90-92 [doi]
- Synthesis of secure software development controlsAlexander Barabanov, Alexey Markov, Andrey Fadin, Valentin Tsirlov, Igor Shakhalov. 93-97 [doi]
- Approbation of the methodology for web monitoring of terrorism- and extremism-related contentEvstifeeva Natalia Alexandrovna, Evstifeeva Olga Urievna. 100-102 [doi]
- Application of cluster analysis for the assessment of the share of fraud victims among bank card holdersS. S. Alkhasov, A. N. Tselykh, A. A. Tselykh. 103-106 [doi]
- Profile-based students assignment to core financial intelligence unit departmentsDaria Chukova, Pakhomov Alexey. 107-108 [doi]
- A graph-based data mining approach to preventing financial fraud: a case studyMargarita Knyazeva, Alexander Tselykh, Alexey Tselykh, Elena Popkova. 109-113 [doi]
- Web service for detecting credit card fraud in near real-timeAlexey Tselykh, Dmitry Petukhov. 114-117 [doi]
- Mitigating conflicts of interest by authorization policiesNezar Nassr, Eric Steegmans. 118-126 [doi]
- Information security in computer networks with dynamic topologyAlexander Minin, Maxim O. Kalinin. 127-130 [doi]
- Steganographic methods of communications in distributed computing networksArtem S. Konoplev, Alexey G. Busygin. 131-134 [doi]
- Large-scale systems security evolution: control theory approachTatiana Stepanova, Dmitry P. Zegzhda. 135-141 [doi]
- Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systemsTaiana Stepanova, Alexander Pechenkin, Daria Lavrova. 142-149 [doi]
- Cybersecurity of ad-hoc distributed systemsDmitry Moskvin, Denis Ivanov. 150-153 [doi]
- Towards proactive detection of advanced persistent threat (APT) attacks using honeypotsZainab Saud, M. Hasan Islam. 154-157 [doi]
- A honeypot-driven cyber incident monitor: lessons learned and steps aheadEmmanouil Vasilomanolakis, Shankar Karuppayah, Panayotis Kikiras, Max Mühlhäuser. 158-164 [doi]
- A classification framework for distinct cyber-attacks based on occurrence patternsMalik S. K. Awan, Mohammed AlGhamdi, Sultan AlMotiri, Pete Burnap, Omer F. Rana. 165-168 [doi]
- DDoS/EDoS attack in cloud: affecting everyone out there!Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi. 169-176 [doi]
- The general model of secure computation systemLudmila K. Babenko, Philipp Burtyka, Oleg B. Makarevich, Alina Trepacheva. 177-184 [doi]
- Two formal problems of network security and a theory of boolean-valued flow networksEvgeny Shcherba. 185-188 [doi]
- Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratoryEcir Ugur Küçüksille, Mehmet Ali Yalçinkaya, Samet Ganal. 189-195 [doi]
- Protection from binary and multi-symbol packet length covert channelsAnna Epishkina, Konstantin Kogos. 196-202 [doi]
- Trust management system for mobile cluster-based wireless sensor networkEvgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich. 203-209 [doi]
- A new algorithm for unkeyed jam resistanceHamid Hanifi, Leemon Baird, Ramakrishna Thurimella. 210-216 [doi]
- Simulation user behavior on a security testbed using user behavior states graphAragats Amirkhanyan, Andrey Sapegin, Marian Gawron, Feng Cheng 0002, Christoph Meinel. 217-223 [doi]
- Development of network security tools for enterprise software-defined networksAlexander Shukhman, Petr Polezhaev, Yuri Ushakov, Leonid Legashev, Veniamin Tarasov, Nadezhda Bakhareva. 224-228 [doi]
- Automatic vulnerability detection for weakness visualization and advisory creationMarian Gawron, Aragats Amirkhanyan, Feng Cheng 0002, Christoph Meinel. 229-236 [doi]
- Few notes towards making honeyword system more secure and usableNilesh Chakraborty, Samrat Mondal. 237-245 [doi]
- Dynamic response recognition by neural network to detect network host anomaly activityVladimir Eliseev, Yury Shabalin. 246-249 [doi]
- Modeling of next-generation firewalls as queueing servicesSergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy. 250-257 [doi]
- SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniquesNaghmeh Moradpoor Sheykhkanloo. 258-266 [doi]
- Designing a context-aware cyber physical system for detecting security threats in motor vehiclesAndrei Petrovski, Prapa Rattadilok, Sergey Petrovski. 267-270 [doi]
- Machine learning approach for filtering spam emailsPrincy George, P. Vinod. 271-274 [doi]
- A dynamic marking method for implicit information flow in dynamic taint analysisXuefei Wang, Hengtai Ma, Lisha Jing. 275-282 [doi]
- DRACO: DRoid analyst combo an android malware analysis frameworkShweta Bhandari, Rishabh Gupta, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari, Maxim Anikeev. 283-289 [doi]
- A robust dynamic analysis system preventing SandBox detection by Android malwareJyoti Gajrani, Jitendra Sarswat, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti. 290-295 [doi]
- Information theoretic method for classification of packed and encoded filesJithu Raphel, P. Vinod. 296-303 [doi]
- Hartley's test ranked opcodes for Android malware analysisMeenu Mary John, P. Vinod, K. A. Dhanya. 304-311 [doi]
- Case based analysis in information security incidents management systemAndrey Shalyapin, Vadim Zhukov. 312-317 [doi]
- Comparison between safety and efficient security of the ARP protocolElvia Leon, Brayan S. Reyes Daza, Octavio J. Salcedo Parra. 318-321 [doi]
- DynaDroid: dynamic binary instrumentation based app behavior monitoring frameworkBharat Buddhdev, Rati Bhan, Manoj Singh Gaur, Vijay Laxmi. 322-325 [doi]
- Developing a system for text-messages protectionMikhaylov Dmitry, Starikovskiy Andrey, Lebedev Grigoriy, Rubin Dmitry, Egorov Alexey, Uleykin Eugeniy, Boruchinkin Alexander, Tolstaya Anastasia. 326-329 [doi]
- Labelled mobile ambients model for information flow security in distributed systemsN. V. Narendra Kumar, R. K. Shyamasundar. 330-337 [doi]
- Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition methodV. O. Osipyan. 338-341 [doi]