297 | -- | 305 | Stefan G. Weber. A Hybrid Attribute-Based Encryption Technique Supporting Expressive Policies and Dynamic Attributes |
306 | -- | 316 | Osama Hayatle, Amr Youssef, Hadi Otrok. Dempster-Shafer Evidence Combining for (Anti)-Honeypot Technologies |
317 | -- | 327 | Vinay Kumar, Abhishek Bansal, Sunil Kumar Muttoo. Hiding Information in Vector Layer While Extracting Layers from Raster Data |
328 | -- | 345 | Konstantinos Rantos, Konstantinos Fysarakis, Charalampos Manifavas. How Effective Is Your Security Awareness Program? An Evaluation Methodology |
346 | -- | 352 | Chandrapal Chahar, Vishal Singh Chauhan, Manik Lal Das. Code Analysis for Software and System Security Using Open Source Tools |
353 | -- | 354 | Abubakr Magzoub. Privacy and Big Data, by Craig, T., and Ludloff, M. E.Sebastopol, CA: O'Reilly Media, 2011, 91p. $14.99. ISBN: 978-1-449-30500-0 |
355 | -- | 356 | Larry Marks. Blackjacking: Security Threats to Blackberry Devices, PDAs and Cell Phones in the Enterprise, by Hoffman, Daniel V.New York: Wiley, 2007, 292p., $39.99.ISBN 978-0-470-12754-4 |