Abstract is missing.
- A Software Framework for PCa-Based Face RecognitionPeng Peng, Paulo S. C. Alencar, Donald D. Cowan. 7-16 [doi]
- Semantic-Security Capacity for the Physical Layer via Information TheoryZiv Goldfeld, Paul Cuff, Haim H. Permuter. 17-27 [doi]
- Identifying Attack Propagation Patterns in Honeypots Using Markov Chains Modeling and Complex Networks AnalysisAriel Bar, Bracha Shapira, Lior Rokach, Moshe Unger. 28-36 [doi]
- The Problem of the Lack of Benefit of a Document to Its Producer (PotLoBoaDtiP)Daniel M. Berry, Krzysztof Czarnecki, Michal Antkiewicz, Mohamed AbdelRazik. 37-42 [doi]
- Thinking Fast: Patterns of Cognitive Error in Software Engineering Education and PracticeReuven Gallant. 43-50 [doi]
- Lessons and Experiences from the Design, Implementation, and Deployment of a Wildlife Tracking SystemSivan Toledo, Oren Kishon, Yotam Orchan, Adi Shohat, Ran Nathan. 51-60 [doi]
- Multilevel Modeling and Reasoning with FOMLMira Balaban, Igal Khitron, Michael Kifer. 61-70 [doi]
- Implementing an International Standard for Manufacturing System Lifecycle Management Using Object-Process MethodologyRea Lavi, Dov Dori, Yehudit Judy Dori. 71-76 [doi]
- An Improved MapReduce Algorithm for Mining Closed Frequent ItemsetsYaron Gonen, Ehud Gudes. 77-83 [doi]
- Cyber Security Education and LawAsher Wilk. 94-103 [doi]
- Using Computer Programming Competition for Cyber EducationOded Margalit. 104-107 [doi]
- A Preliminary Survey on Domain-Specific Languages for Machine Learning in Big DataIvens Portugal, Paulo S. C. Alencar, Donald D. Cowan. 108-110 [doi]
- Study the Past If You Would Define the Future: Implementing Secure Multi-party SDN UpdatesLiron Schiff, Stefan Schmid. 111-116 [doi]
- Towards Automated Measurements of Internet's Naming InfrastructureAndreas Borgwart, Haya Shulman, Michael Waidner. 117-124 [doi]
- On Modeling, Complexities, and Automatic Configuration of Wireless Industrial Control NetworksAmir Menczel, Gera Weiss, Dror Fried. 125-134 [doi]
- Modeling and Reconstruction of Multi-stage AttacksSergey Rubinshtein, Rami Puzis. 135-137 [doi]
- MaPE-K-Based Approach for Security @ RuntimeMohamed Amoud, Ounsa Roudiès. 138-140 [doi]