249 | -- | 267 | Yoones A. Sekhavat. CFM: collusion-free model of privacy preserving frequent itemset mining |
268 | -- | 288 | Mohamed Elhoseny, Hosny A. Abbas. Towards automated SCADA forensic investigation: challenges, opportunities and promising paradigms |
289 | -- | 308 | Guizhen Mai, Shuiguo Peng, YingHan Hong, Pinghua Chen. Fast causal division for supporting robust causal discovery |
309 | -- | 321 | Mircho Mirchev, Seferin Mirtchev. System for DDoS attack mitigation by discovering the attack vectors through statistical traffic analysis |
322 | -- | 336 | Dharavath Ramesh, Rashmi Priya, Damodar Reddy Edla. HHDSSC: harnessing healthcare data security in cloud using ciphertext policy attribute-based encryption |
337 | -- | 356 | Alka Gupta, Lalit Sen Sharma. Snort |
357 | -- | 371 | V. Biksham, D. Vasumathi 0001. A lightweight fully homomorphic encryption scheme for cloud security |
372 | -- | 395 | Indu Singh, Nikhil Arora, Shivam Arora, Parteek Singhal. Fuzzy ARM and cluster analysis for database intrusion detection and prevention |
396 | -- | 410 | Sonika Shrivastava, R. K. Pateriya. Data encoding and cost optimised distribution for efficient and secure storage in cloud federation |
411 | -- | 427 | Pranjal S. Bogawar, Kishor K. Bhoyar. Comparative study of classification approaches for e-mail analysis |
428 | -- | 443 | Lamia Hamza. Intruder model for generating attack scenarios in computer systems |