8 | -- | 30 | O. T. Arogundade, A. T. Akinwale, Z. Jin, X. G. Yang. A Unified Use-Misuse Case Model for Capturing and Analysing Safety and Security Requirements |
31 | -- | 46 | Benjamin Ngugi, Jafar Mana, Lydia Segal. Evaluating the Quality and Usefulness of Data Breach Information Systems |
47 | -- | 58 | Hassen Sallay, Mohsen Rouached, Adel Ammar, Ouissem Ben Fredj, Khalid Al-Shalfan, Majdi Ben Saad. Wild-Inspired Intrusion Detection System Framework for High Speed Networks (f|p) IDS Framework |