Abstract is missing.
- Detecting Social Situations from Interaction GeometryGeorg Groh, Alexander Lehmann, Jonas Reimers, Marc René Friess, Loren Schwarz. 1-8 [doi]
- Team Formation for Generalized Tasks in Expertise Social NetworksCheng-Te Li, Man-Kwan Shan. 9-16 [doi]
- Learning About the Quality of Teamwork from WikiteamsPiotr Turek, Adam Wierzbicki, Radoslaw Nielek, Albert Hupa, Anwitaman Datta. 17-24 [doi]
- Participatory Risk Management: Managing Community Risk Through GamesMiao Jiang, William L. McGill. 25-32 [doi]
- A Probabilistic Approach to Personalized Tag RecommendationMeiqun Hu, Ee-Peng Lim, Jing Jiang. 33-40 [doi]
- Preserve Your Privacy with PCO: A Privacy Sensitive Architecture for Context Obfuscation for Pervasive E-Community Based ApplicationsFarzana Rahman, Md. Endadul Hoque, Ferdaus Ahmed Kawsar, Sheikh Iqbal Ahamed. 41-48 [doi]
- Experiments in Microblog SummarizationBeaux Sharifi, Mark-Anthony Hutton, Jugal K. Kalita. 49-56 [doi]
- Development of Communication Model for Social Robots Based on Mobile ServiceJi-Dong Yim, Sungkuk Chun, Keechul Jung, Christopher D. Shaw. 57-64 [doi]
- Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation AnalysisYuhong Liu, Yan (Lindsay) Sun. 65-72 [doi]
- A Trust Model for Intervehicular Communication Based on Belief TheoryWalter Bamberger, Josef Schlittenlacher, Klaus Diepold. 73-80 [doi]
- The Evolution of Friendships in Chinese Online Social NetworksLouis Yu, Valerie King. 81-87 [doi]
- Structural Predictors of Tie Formation in Twitter: Transitivity and MutualityScott A. Golder, Sarita Yardi. 88-95 [doi]
- Personalized Feed Recommendation Service for Social NetworksHuajing Li, Yuan Tian, Wang-Chien Lee, C. Lee Giles, Meng Chang Chen. 96-103 [doi]
- Finding Overlapping Communities in Social NetworksMark K. Goldberg, Stephen Kelley, Malik Magdon-Ismail, Konstantin Mertsalov, Al Wallace. 104-113 [doi]
- Decomposing Social NetworksWhitman Richards, Owen Macindoe. 114-119 [doi]
- Precursors and Laggards: An Analysis of Semantic Temporal Relationships on a Blog NetworkTelmo Menezes, Camille Roth, Jean-Philippe Cointet. 120-127 [doi]
- Team Performance Prediction in Massively Multiplayer Online Role-Playing Games (MMORPGs)Kyong Jin Shim, Jaideep Srivastava. 128-136 [doi]
- Follow the Profit or the Herd? Exploring Social Effects in Peer-to-Peer LendingDawei Shen, Coco Krumme, Andrew Lippman. 137-144 [doi]
- Prisoner s Dilemma in Graphs with Heterogeneous AgentsLingzhi Luo, Nilanjan Chakraborty, Katia P. Sycara. 145-152 [doi]
- Tweethood: Agglomerative Clustering on Fuzzy k-Closest Friends with Variable Depth for Location MiningSatyen Abrol, Latifur Khan. 153-160 [doi]
- On the Navigability of Social Tagging SystemsDenis Helic, Christoph Trattner, Markus Strohmaier, Keith Andrews. 161-168 [doi]
- Estimating the Size of Online Social NetworksShaozhi Ye, Shyhtsun Felix Wu. 169-176 [doi]
- Want to be Retweeted? Large Scale Analytics on Factors Impacting Retweet in Twitter NetworkBongwon Suh, Lichan Hong, Peter Pirolli, Ed H. Chi. 177-184 [doi]
- q-Anon: Rethinking Anonymity for Social NetworksAaron Beach, Mike Gartrell, Richard Han. 185-192 [doi]
- Graph Comparison Using Fine Structure AnalysisOwen Macindoe, Whitman Richards. 193-200 [doi]
- Dark Gold: Statistical Properties of Clandestine Networks in Massively Multiplayer Online GamesBrian Keegan, Muhammad Aurangzeb Ahmad, Dmitri Williams, Jaideep Srivastava, Noshir S. Contractor. 201-208 [doi]
- Learning to Predict Ad Clicks Based on Boosted Collaborative FilteringTeng-Kai Fan, Chia-Hui Chang. 209-216 [doi]
- Behavior Evolution and Event-Driven Growth Dynamics in Social NetworksBaojun Qiu, Kristinka Ivanova, John Yen, Peng Liu. 217-224 [doi]
- A Qualitative Method to Find Influencers Using Similarity-based Approach in the BlogosphereEunyoung Moon, Sangki Han. 225-232 [doi]
- Churn in Social Networks: A Discussion Boards Case StudyMarcel Karnstedt, Tara Hennessy, Jeffrey Chan, Conor Hayes. 233-240 [doi]
- Characterizing Dense Urban Areas from Mobile Phone-Call Data: Discovery and Social DynamicsMarcos R. Vieira, Vanessa FrĂas-MartĂnez, Nuria Oliver, Enrique FrĂas-MartĂnez. 241-248 [doi]
- Link Creation and Profile Alignment in the aNobii Social NetworkLuca Maria Aiello, Alain Barrat, Ciro Cattuto, Giancarlo Ruffo, Rossano Schifanella. 249-256 [doi]
- Measuring Social Relations: Case OtaSizzleJuuso Karikoski, Matti Nelimarkka. 257-263 [doi]
- A Computational Trust Framework for Social Computing (A Position Paper for Panel Discussion on Social Computing Foundations)Justin Zhan, Xing Fang. 264-269 [doi]
- The Many Faces of Mentoring in an MMORPGMuhammad Aurangzeb Ahmad, David A. Huffaker, Jing Wang, Jeffrey William Treem, Dinesh Kumar, Marshall Scott Poole, Jaideep Srivastava. 270-275 [doi]
- Paying Attention to Each Other in Visible Work Communities: Modeling Bursty Systems of Multiple Activity StreamsJamie F. Olson, James Howison, Kathleen M. Carley. 276-281 [doi]
- Mining Temporal Subgraph Patterns in Heterogeneous Information NetworksHsun-Ping Hsieh, Cheng-Te Li. 282-287 [doi]
- Discovering Influence in Communication Networks Using Dynamic Graph AnalysisAlexy Khrabrov, George Cybenko. 288-294 [doi]
- A Scalable Framework for Modeling Competitive Diffusion in Social NetworksMatthias Broecheler, Paulo Shakarian, V. S. Subrahmanian. 295-302 [doi]
- Measuring Similarity between Sets of Overlapping ClustersMark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail. 303-308 [doi]
- Detection of Overlapping Communities in Dynamical Social NetworksRemy Cazabet, Frédéric Amblard, Chihab Hanachi. 309-314 [doi]
- Representing Diversity in Communities of Bayesian Decision-makersKshanti A. Greene, Joe Michael Kniss, George F. Luger. 315-322 [doi]
- A Recommender System for Youtube Based on its Network of ReviewersSong Qin, Ronaldo Menezes, Marius Silaghi. 323-328 [doi]
- Analysis of Social Dynamics on FDA Panels Using Social Networks Extracted from Meeting TranscriptsDavid A. Broniatowski, Christopher L. Magee. 329-334 [doi]
- Analyzing Sentiment Markers Describing Radical and Counter-Radical Elements in Online NewsHasan Davulcu, Syed Toufeeq Ahmed, Sedat Gokalp, M hamed H. Temkit, Tom Taylor, Mark Woodward, Ali Amin. 335-340 [doi]
- Network Exchange in Trust NetworksMuhammad Aurangzeb Ahmad, Marshall Scott Poole, Jaideep Srivastava. 341-346 [doi]
- WISDOM from Light-Weight Information RetrievalDavid B. Bracewell, Steven Gustafson, Abha Moitra, Gregg Steuben. 347-354 [doi]
- Exploration of Asynchronous Online Teaching with a Network Analysis of Class InteractionRhoda Baggs, Chan-Wei Wu. 355-362 [doi]
- Email-based Social Network TrustDijiang Huang, Vetri Arasan. 363-370 [doi]
- Authority vs Affinity: Modeling User Intent in Expert FindingSuratna Budalakoti, K. Suzanne Barber. 371-378 [doi]
- On Adoption of Social Computing in the Engineering CommunitySigal Louchheim, Sally Price. 379-384 [doi]
- Bonding vs. Bridging Social Capital: A Case Study in TwitterMatthew S. Smith, Christophe G. Giraud-Carrier. 385-392 [doi]
- Traffic in Social Media II: Modeling Bursty PopularityJacob Ratkiewicz, Filippo Menczer, Santo Fortunato, Alessandro Flammini, Alessandro Vespignani. 393-400 [doi]
- Building Mobile Social Network with Semantic Relation Using Bayesian NeTwork-based Life-log MiningHan-Saem Park, Sung-Bae Cho. 401-406 [doi]
- Multi-Layered Social Network Creation Based on Bibliographic DataPrzemyslaw Kazienko, Piotr BrĂ³dka, Katarzyna Musial, Jarosaw Gaworecki. 407-412 [doi]
- From Communication to Collaboration: Simulating the Emergence of Inter-organizational Collaboration NetworkKang Zhao, John Yen, Louis-Marie Ngamassi Tchouakeu, Carleen F. Maitland, Andrea Hoplight Tapia. 413-418 [doi]
- Exploring Social Networks: A Frequent Pattern Visualization ApproachCarson Kai-Sang Leung, Christopher L. Carmichael. 419-424 [doi]
- Messaging Behavior Modeling in Mobile Social NetworksByung-Won On, Ee-Peng Lim, Jing Jiang, Freddy Chong Tat Chua, Viet-An Nguyen, Loo-Nin Teow. 425-430 [doi]
- Assessing the Value of Contributions in Tagging SystemsElizeu Santos-Neto, Flavio Figueiredo, Jussara M. Almeida, Miranda Mowbray, Marcos André Gonçalves, Matei Ripeanu. 431-438 [doi]
- Using Online Media Sharing Behavior as Implicit Feedback for Collaborative FilteringGeonhyeok Go, Joonhyuk Yang, Hyun Woo Park, Steve SangKi Han. 439-445 [doi]
- Mining Human Location-Routines Using a Multi-Level Approach to Topic ModelingKatayoun Farrahi, Daniel Gatica-Perez. 446-451 [doi]
- Traffic in Social Media I: Paths Through Information NetworksJacob Ratkiewicz, Alessandro Flammini, Filippo Menczer. 452-458 [doi]
- Facilitating Knowledge Exploration in Folksonomies: Expertise Ranking by Link and Semantic StructuresWai-Tat Fu, Wei Dong. 459-464 [doi]
- SERPWatcher: A Sophisticated Mining Tool Utilizing Search Engine Results Pages (SERPs) for Social Change DiscoveryYoshifumi Masunaga, Kazunari Ito, Yoichi Miyama, Naoko Oyama, Chiemi Watanabe, Kaoru Tachi. 465-472 [doi]
- The Dynamics of Two Cognitive Heuristics for Coordination on NetworksIyad Rahwan, Fatemeh Jahedpari, Sherief Abdallah. 473-479 [doi]
- Automated Inference of Socio-Cultural Information from Natural Language ConversationsRichard Scherl, Daniela Inclezan, Michael Gelfond. 480-487 [doi]
- Impactrank: A Study on News Impact ForecastingSukru Tikves, Hasan Davulcu. 488-493 [doi]
- Ubiquitous Monitoring in the Office: Salient Perceptions of Data Collection DevicesStuart Moran, Keiichi Nakata. 494-499 [doi]
- Social Intelligence in Completely Online Groups - Toward Social Prosthetics from Log Data Analysis and TransformationSean P. Goggins, Michael Gallagher, James M. Laffey, Christopher Amelung. 500-507 [doi]
- Exploring Social Contexts along the Time Dimension: Temporal Analysis of Named EntitiesBrett Walenz, Robin A. Gandhi, William R. Mahoney, Qiuming Zhu. 508-512 [doi]
- Using Stereotypes to Identify Risky Transactions in Internet AuctionsXin Liu, Tomasz Kaszuba, Radoslaw Nielek, Anwitaman Datta, Adam Wierzbicki. 513-520 [doi]
- Detecting Terrorism Evidence in Text DocumentsAbdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil. 521-527 [doi]
- Friendfeed Breaking News: Death of a Public FigureMatteo Magnani, Danilo Montesi, Luca Rossi. 528-533 [doi]
- The Impact of Web 2.0 Developments on Real-Time GroupwareStephen Mogan, Weigang Wang. 534-539 [doi]
- Politeness in Social Networks: Using Verbal Behaviors to Assess Socially-Accorded RegardChristopher A. Miller, Sonja Schmer-Galunder, Jeffrey M. Rye. 540-545 [doi]
- A Geometric Pattern-based Method to Build Hierarchies of Geo-Referenced TagsDonggi Jung, Hyunwoo Park, Ryong Maeng, Sangki Han. 546-551 [doi]
- Classification of Short Text Comments by Sentiment and Actionability for VoiceYourViewWilliam Simm, Maria Angela Ferrario, Scott Songlin Piao, Jon Whittle, Paul Rayson. 552-557 [doi]
- Measurement, Modeling, and Analysis of a Large-scale Blog Sever WorkloadMyeongjae Jeon, Jeaho Hwang, Youngjae Kim, Jae-Wan Jang, Joonwon Lee, Euiseong Seo. 558-563 [doi]
- Who Communicates with Whom? Measuring Communication Choices on Social Media SitesChristoph Stadtfeld. 564-569 [doi]
- Does Similarity Breed Connection? - An Investigation in Blogcatalog and Last.fm CommunitiesHalil Bisgin, Nitin Agarwal, Xiaowei Xu. 570-575 [doi]
- Evaluating Community Structure in Bipartite NetworksXin Liu, Tsuyoshi Murata. 576-581 [doi]
- Cross-Lingual Information Retrieval as a Side Effect of TaggingMariam Elhussein, Keiichi Nakata. 582-586 [doi]
- Making Friends in Life and Online: Equivalence, Micro-Correlation and Value in Spatial and Transpatial Social NetworksVassilis Kostakos, Jayant Venkatanathan. 587-594 [doi]
- An Analysis Method for Service Process Considering Resource Operation RulesTomoe Tomiyama, Tatsuhiro Sato. 595-600 [doi]
- A Cluster-based Approach for Automatic Social Network ConstructionWei-Lun Chang, Tzu-Hsiang Lin. 601-606 [doi]
- Network Analysis Applied to a Bibliographic NetworkQingyi Gao. 615-622 [doi]
- Towards Cloud and Terminal Collaborative Mobile Social Network ServiceWu Zhenyu, Zhang Chunhong, Ji Yang, Wang Hao. 623-629 [doi]
- Analyzing Effects of Electricity Subsidy on Social Welfare in Iran by Integrated System Approach and Artificial Neural NetworkMansooreh Zarezadeh, Mohammad Ali Azadeh, Seyed Farid Ghaderi. 630-635 [doi]
- Interactive Phrasebook - Embedding Human Social Dynamics in Language TrainingPeggy Wu, Christopher A. Miller. 636-640 [doi]
- GDC: Group Discovery Using Co-location TracesSteve Mardenfeld, Daniel Boston, Susan Juan Pan, Quentin Jones, Adriana Iamnitchi, Cristian Borcea. 641-648 [doi]
- Phishing Using a Modified Bayesian TechniqueKrist Beck, Justin Zhan. 649-655 [doi]
- The Swarm Model in Open Source Software Developer CommunitiesXiaohui Cui, Justin M. Beaver, Everett Stiles, Laura Pullum, Brian A. Klump, Jim N. Treadwell, Thomas E. Potok. 656-660 [doi]
- Media Monitoring Using Social NetworksTony White, Wayne Chu, Amirali Salehi-Abari. 661-668 [doi]
- Learning Influence Propagation of Personal Blogs with Content and Network AnalysesIl-Chul Moon, Dongwoo Kim, Yohan Jo, Alice H. Oh. 669-674 [doi]
- Opinion Summarization in Bengali: A Theme Network ModelAmitava Das, Sivaji Bandyopadhyay. 675-682 [doi]
- Using Text Analysis to Understand the Structure and Dynamics of the World Wide Web as a Multi-Relational GraphHarish Sethu, Alexander Yates. 683-686 [doi]
- A Methodology for Integrating Network Theory and Topic Modeling and its Application to Innovation DiffusionJana Diesner, Kathleen M. Carley. 687-692 [doi]
- Detecting Emergence in Social NetworksPeter Haglich, Christopher Rouff, Laura Pullum. 693-696 [doi]
- Framework for Modeling Opinion Dynamics Influenced by Targeted MessagesSergey Malinchik. 697-700 [doi]
- Construction of Synthetic Populations with Key Attributes: Simulation Set-Up While Accommodating Multiple Approaches within a Flexible Simulation PlatformSteven J. Fernandez, Amy N. Rose, Edward A. Bright, Justin M. Beaver, Christopher T. Symons, Olufemi A. Omitaomu, Cathy Jiao. 701-706 [doi]
- 2Ploc: Preserving Privacy in Location-based ServicesAmir Salar Amoli, Mehdi Kharrazi, Rasool Jalili. 707-712 [doi]
- Failure Feedback for User Obligation SystemsMurillo Pontual, Keith Irwin, Omar Chowdhury, William H. Winsborough, Ting Yu. 713-720 [doi]
- Impact of Encryption on Qos in VoipPedram Radmand, Alex Talevski. 721-726 [doi]
- VLR Group Signatures with Indisputable Exculpability and Efficient RevocationLiqun Chen, Jiangtao Li. 727-734 [doi]
- Incentive Compatible Distributed Data MiningMurat Kantarcioglu, Robert Nix. 735-742 [doi]
- Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based ApproachClaudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati. 743-750 [doi]
- OSNAC: An Ontology-based Access Control Model for Social Networking SystemsAmirreza Masoumzadeh, James B. D. Joshi. 751-759 [doi]
- SUCAS: An Architecture for Secure User Centric Attestation in Location-based ServicesLee Fueng Yap, Takeshi Yashiro, Masahiro Bessho, Tomonori Usaka, M. Fahim Ferdous Khan, Noboru Koshizuka, Ken Sakamura. 760-767 [doi]
- Enhanced Privacy ID from Bilinear Pairing for Hardware Authentication and AttestationErnie Brickell, Jiangtao Li. 768-775 [doi]
- A Decision Theoretic Approach to Data Leakage PreventionJanusz Marecki, Mudhakar Srivatsa, Pradeep Varakantham. 776-784 [doi]
- Alerts Analysis and Visualization in Network-based Intrusion Detection SystemsLi Yang, Wade Gasior, Rajeshwar Katipally, Xiaohui Cui. 785-790 [doi]
- Practical and Secure Integer Comparison and Interval CheckAhmet Erhan Nergiz, Mehmet Ercan Nergiz, Thomas Pedersen, Chris Clifton. 791-799 [doi]
- Achieving Receiver Location Privacy in Mobile Ad Hoc NetworksSomayeh Taheri, Salke Hartung, Dieter Hogrefe. 800-807 [doi]
- Measuring Disclosure Risk for Multimethod Synthetic Data GenerationMichael D. Larsen, Jennifer C. Huckett. 808-815 [doi]
- A Private and Reliable Recommendation System for Social NetworksT. Ryan Hoens, Marina Blanton, Nitesh V. Chawla. 816-825 [doi]
- An Efficient Range Proof SchemeKun Peng, Feng Bao. 826-833 [doi]
- Automatic Conformance Verification of Distributed Firewalls to Security RequirementsNihel Ben Youssef, Adel Bouhoula. 834-841 [doi]
- Exploring Rootkit Detectors Vulnerabilities Using a New Windows Hidden Driver Based RootkitWoei-Jiunn Tsaur, Yuh-Chen Chen. 842-848 [doi]
- Malicious Modification Attacks by Insiders in Relational Databases: Prediction and PreventionQussai Yaseen, Brajendra Panda. 849-856 [doi]
- General Trust Management - GTMDalal Ahmed Al-Arayed, JoĂ£o Pedro Sousa. 857-864 [doi]
- A Vagueness-based Obfuscation Technique for Protecting Location PrivacyJafar Haadi Jafarian. 865-872 [doi]
- The Design and Enforcement of a Rule-based Constraint Policy Language for Service CompositionWei Wei, Ting Yu. 873-880 [doi]
- Gradual Identity Exposure Using Attribute-Based EncryptionDijiang Huang, Zhibin Zhou, Zhu Yan. 881-888 [doi]
- Evolving Gaming Strategies for Attacker-Defender in a Simulated Network EnvironmentPavan Kalyan Vejandla, Dipankar Dasgupta, Aishwarya Kaushal, Fernando Niño. 889-896 [doi]
- On Generating RFID Privacy Policies in Consideration of Openness and EnforcementShi-Cho Cha, Ren-Ting Ku, Ya-Ping Fu, Hao-Ping Lin. 897-905 [doi]
- Security and Privacy Risks of Using E-mail Address as an IdentityLei Jin, Hassan Takabi, James B. D. Joshi. 906-913 [doi]
- A Novel Approach for the Development and Deployment of Security PatternsAzzam Mourad, Hadi Otrok, Lama Baajour. 914-919 [doi]
- Increasing Trustworthiness through Security Testing SupportJose Romero-Mariona, Hadar Ziv, Debra J. Richardson. 920-925 [doi]
- Comparative Analysis of ccTLD Security PoliciesCollins Umana, Pavol Zavarsky, Ron Ruhl, Dale Lindskog, Oluwatoyin Gloria Ake-Johnson. 926-933 [doi]
- A Privacy-Enabled Architecture for an RFID-based Location Monitoring SystemJames Lee, Khalil El-Khatib. 934-937 [doi]
- Malware Type Recognition and Cyber Situational AwarenessThomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth Bauer, Michael R. Grimaila, Steven K. Rogers. 938-943 [doi]
- A Formal Model to Analyze the Permission Authorization and Enforcement in the Android FrameworkWook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka. 944-951 [doi]
- Network Security Risk Assessment Using Bayesian Belief NetworksSuleyman Kondakci. 952-960 [doi]
- A Secure Distributed File System for Medical Image ArchivingJiang Bian, Remzi Seker, Umit Topaloglu. 961-966 [doi]
- Using Term Extraction Patterns to Discover Coherent Relationships from Open Source IntelligenceWilliam L. Sousan, Qiuming Zhu, Robin A. Gandhi, William R. Mahoney, Anup C. Sharma. 967-972 [doi]
- Information Privacy in Two Dimensions - Towards a Classification Scheme for Information Privacy ResearchKamil Reddy, Hein S. Venter. 973-980 [doi]
- Building a Social Dimensional Threat Model from Current and Historic Events of Cyber AttacksAnup C. Sharma, Robin A. Gandhi, William R. Mahoney, William L. Sousan, Qiuming Zhu. 981-986 [doi]
- On the Impact of Environmental Metrics on CVSS ScoresLaurent Gallon. 987-992 [doi]
- A Multi-factor Approach to Securing Software on Client Computing PlatformsRaghunathan Srinivasan, Vivek Iyer, Amit Kanitkar, Sujit Sanjeev, Jatin Lodhia, Partha Dasgupta. 993-998 [doi]
- A Secure Smart-Card-based Password Authenticated Key Agreement Scheme in Multi-server EnvironmentsWoei-Jiunn Tsaur, Chia Chun Wu. 999-1003 [doi]
- Trust Formation Based on Subjective Logic and PGP Web-of-Trust for Information Sharing in Mobile Ad Hoc NetworksAsmidar Abu Bakar, Roslan Ismail, Abdul Rahim Ahmad, Jamalul-Lail Abdul Manan. 1004-1009 [doi]
- Secure Wireless Embedded Systems Via Component-based DesignTheis Hjorth, Rune Torbensen. 1010-1015 [doi]
- Diseases Propagation Analysis Due to Natural Disasters Using Computational MathematicsDavinson Castano Cano. 1016-1021 [doi]
- Correcting Codes in the Quantum Keys Reconciliation: Scenarios of Privacy MaintenanceMohamed Bader Boughattas, Ben Slimen Iyed, Houria Rezig. 1022-1025 [doi]
- AHP Implemented Security Assessment and Security Weight VerificationXuhua Ji, Colin Pattinson. 1026-1031 [doi]
- Access Control Mechanism Based on Trust QuantificationShunan Ma, Jingsha He, Xunbo Shuai, Zhao Wang. 1032-1037 [doi]
- User s Perspective: Privacy and Security of Information on Social NetworksCaroline Ngeno, Pavol Zavarsky, Dale Lindskog, Ron Ruhl. 1038-1043 [doi]
- A Framework for Home Wireless Network Security EducationEbenezer Sackey, Dale Lindskog, Ron Ruhl, Pavol Zavarsky. 1044-1049 [doi]
- CBPM: Context Based Privacy ModelMartha VenkataSwamy, Srini Ramaswamy, Nitin Agarwal. 1050-1055 [doi]
- Data Mishandling and Profile Building in Ubiquitous EnvironmentsAbdullahi Arabo, Qi Shi, Madjid Merabti. 1056-1063 [doi]
- A Rough Set Approach to Agent Trust ManagementSadra Abedinzadeh, Samira Sadaoui. 1064-1071 [doi]
- System-based Approach to Software VulnerabilitySabah S. Al-Fedaghi. 1072-1079 [doi]
- Mobile Malware Behavioral Analysis and Preventive Strategy Using OntologyHsiu-Sen Chiang, Woei-Jiunn Tsaur. 1080-1085 [doi]
- Towards a Risk-Driven Methodology for Privacy Metrics DevelopmentReijo Savola. 1086-1092 [doi]
- An Advanced Cloaking Algorithm Using Hilbert Curves for Anonymous Location Based ServiceJung-Ho Um, Hee-Dae Kim, Jae-Woo Chang. 1093-1098 [doi]
- Location-Based Kerberos Authentication ProtocolN. T. Abdelmajid, M. A. Hossain, S. Shepherd, K. Mahmoud. 1099-1104 [doi]
- Securing Shareable Life-logsReza Rawassizadeh, A Min Tjoa. 1105-1110 [doi]
- Audience Segregation in Social Network SitesBibi van den Berg, Ronald Leenes. 1111-1116 [doi]
- Social Networking Sites Security: Quo VadisMarkus Huber, Martin Mulazzani, Edgar R. Weippl. 1117-1122 [doi]
- Towards (Semi-) Automatic Moderation of Social Web AnnotationsElaheh Momeni. 1123-1128 [doi]
- Data Leak Prevention through Named Entity RecognitionJosé María Gómez Hidalgo, Jose Miguel Martin-Abreu, Javier Nieves, Igor Santos, Felix Brezo, Pablo Garcia Bringas. 1129-1134 [doi]
- Evaluating Potentials of Internet- and Web-based Socialtv in the Light of PrivacyMohamed Bourimi, Dhiah el Diehn I. Abou-Tair, Dogan Kesdogan, Thomas Barth, Kathrin Hofke. 1135-1140 [doi]
- Privacy Aspects of Mashup ArchitectureGerald Bader, Amin Anjomshoaa, A Min Tjoa. 1141-1146 [doi]
- Improving Cyber Security and Mission Assurance Via Cyber Preparedness (Cyber Prep) LevelsDeborah J. Bodeau, Richard D. Graubart, Jennifer Fabius-Greene. 1147-1152 [doi]
- A Systematic Comprehensive Computational Model for Stake Estimation in Mission Assurance - Applying Cyber Security Econometrics System (CSES) to Mission Assurance Analysis Protocol (MAAP)Robert K. Abercrombie, Frederick T. Sheldon, Michael R. Grimaila. 1153-1158 [doi]
- Managed Mission Assurance - Concept, Methodology and Runtime SupportPartha Pratim Pal, Kurt Rohloff, Michael Atighetchi, Richard E. Schantz. 1159-1164 [doi]
- Improving Operational Resilience Processes: The CERT Resilience Management ModelRichard A. Caralli, Julia H. Allen, Pamela D. Curtis, David W. White, Lisa R. Young. 1165-1170 [doi]
- Mitigating Security Risks for End User Computing Application (EUCA) DataAbhijit Kulkarni, Emilio Williams, Michael R. Grimaila. 1171-1176 [doi]
- Providing Mission Assurance for Airborne NetworksWilliam Heinbockel, Peter Kertzner, Rosalie McQuaid. 1183-1187 [doi]
- Mission Aware Cyber Policy RepresentationSamuel N. Hamilton, Sarah L. Muccio, Dean Lee, Allen Ott. 1188-1193 [doi]
- Toward Linking Information Assurance and Air and Missile Defense Mission MetricsA. K. Castner, M. H. Henry, R. R. J. Jailall, V. H. Nguyen, B. L. Paulhamus, E. P. Reilly. 1194-1199 [doi]