117 | -- | 129 | Erich Dondyk, Louis Rivera, Cliff Changchun Zou. Wi-Fi access denial of service attack to smartphones |
130 | -- | 138 | Sheetal Kalra, Sandeep K. Sood. ECC-based anti-phishing protocol for cloud computing services |
139 | -- | 153 | Anshu Tripathi, Umesh Kumar Singh. A model for quantitative security measurement and prioritisation of vulnerability mitigation |
154 | -- | 168 | Wei Yu, Linqiang Ge, Difan Zhang, Rommie L. Hardy, Robert J. Reschly. On effective sampling techniques in host-based intrusion detection in tactical MANET |
169 | -- | 178 | Pierre St. Juste, Heungsik Eom, Benjamin Woodruff, Corey Baker, Renato J. O. Figueiredo. Enabling decentralised microblogging through P2PVPNs |