305 | -- | 312 | Khaled Salah, Aslam Chaudary. Modelling and analysis of rule-based network security middleboxes |
313 | -- | 320 | Suleiman Y. Yerima, Sakir Sezer, Igor Muttik. High accuracy android malware detection using ensemble learning |
321 | -- | 327 | Zhenqing Shi, Bin Zhang 0003, Dengguo Feng. Practical-time related-key attack on Hummingbird-2 |
328 | -- | 333 | Riham AlTawy, Amr M. Youssef. Watch your constants: malicious Streebog |
334 | -- | 343 | Walid I. Khedr, Mahmoud I. Abdalla, Asmaa A. Elsheikh. Enhanced inter-access service network handover authentication scheme for IEEE 802.16m network |
344 | -- | 353 | Fangfang Dai, Ying Hu, Kangfeng Zheng, Bin Wu. Exploring risk flow attack graph for security risk assessment |
354 | -- | 364 | Gaoli Wang, Hongbo Yu. Improved cryptanalysis on RIPEMD-128 |
365 | -- | 373 | Ali Al-Haj, Gheith A. Abandah, Noor Hussein. Crypto-based algorithms for secured medical image transmission |
374 | -- | 379 | Wei Wang 0012, Yongzhong He, Jiqiang Liu, Sylvain Gombault. Constructing important features from massive network traffic for lightweight intrusion detection |
380 | -- | 386 | Lin Cheng, Qiaoyan Wen. Cryptanalysis and improvement of a certificateless partially blind signature |