1 | -- | 17 | Sergei Evdokimov, Matthias Fischmann, Oliver Günther. Provable Security for Outsourcing Database Operations |
18 | -- | 31 | Ran Tao, Li Yang, Lu Peng, Bin Li. A Host-Based Intrusion Detection System Using Architectural Features to Improve Sophisticated Denial-of-Service Attack Detections |
32 | -- | 60 | Charles C. Tappert, Sung-Hyuk Cha, Mary Villani, Robert S. Zack. A Keystroke Biometric Systemfor Long-Text Input |
61 | -- | 92 | Surya B. Yadav. A Six-View Perspective Framework for System Security: Issues, Risks, and Requirements |
93 | -- | 116 | M. Sumeeth, R. I. Singh, J. Miller. Are Online Privacy Policies Readable? |