79 | -- | 97 | Shijie Zhou. A Survey on Fast-flux Attacks |
98 | -- | 108 | Nanta Janpitak, Chanboon Sathitwiriyawong. Automated Compliance Checking Methodology for Non-Log Operations |
109 | -- | 117 | S. Srisakthi, A. P. Shanthi. Towards the Design of a Secure and Fault Tolerant Cloud Storage in a Multi-Cloud Environment |
118 | -- | 126 | Manas Ranjan Nayak, Baidyanath Tudu, Abhishek Basu, Subir Kumar Sarkar. On the Implementation of a Secured Digital Watermarking Framework |
127 | -- | 132 | Neamen Negash, Xiangdong Che. An Overview of Modern Botnets |
133 | -- | 145 | Adebukola Onashoga, Olusola O. Abayomi-Alli, Adesina Simon Sodiya, David A. Ojo. An Adaptive and Collaborative Server-Side SMS Spam Filtering Scheme Using Artificial Immune System |
146 | -- | 156 | Primoz Cigoj, Borka Jerman-Blazic. An Authentication and Authorization Solution for a Multiplatform Cloud Environment |
157 | -- | 163 | Eric J. Smith, Nina A. Kollars. QR Panopticism: User Behavior Triangulation and Barcode-Scanning Applications |
164 | -- | 176 | Theodoros Spyridopoulos, Konstantinos Maraslis, Alexios Mylonas, Theo Tryfonas, George C. Oikonomou. A Game Theoretical Method for Cost-Benefit Analysis of Malware Dissemination Prevention |
177 | -- | 184 | Richard G. Taylor. Potential Problems with Information Security Risk Assessments |
185 | -- | 193 | Nazmul Islam, Kazi Md. Rokibul Alam, Shaikh Shiam Rahman. Commutative Re-encryption Techniques: Significance and Analysis |
194 | -- | 206 | Su Zhang, Xinming Ou, Doina Caragea. Predicting Cyber Risks through National Vulnerability Database |
207 | -- | 220 | Hussain Alsaiari, Maria Papadaki, Paul Dowland, Steven Furnell. Secure Graphical One Time Password (GOTPass): An Empirical Study |