1 | -- | 19 | William R. Claycomb, Carly L. Huth. A Method For Characterizing Sociotechnical Events Related to Insider Threat Sabotage |
20 | -- | 37 | Philip A. Legg, Nick Moffat, Jason R. C. Nurse, Jassim Happa, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese. Towards a Conceptual Model and Reasoning Structure for Insider Threat Detection |
38 | -- | 48 | Christian W. Probst, René Rydhof Hansen. Reachability-based Impact as a Measure for Insiderness |
49 | -- | 64 | Dongwan Shin, Huiping Yao. A User Study of Security Warnings for Detecting QR Code Based Attacks on Android Phone |
65 | -- | 79 | Jian Xu, Yuxi Li, Jingwei Miao, Fucai Zhou. The Electronic Cash Protocol Based on Dynamic Group Signature |
80 | -- | 92 | Wonjun Cho, Youngho Park, Chul Sur, Kyung Hyune Rhee. An Improved Privacy-Preserving Navigation Protocol in {VANET}s |
93 | -- | 107 | Kunwar Singh, C. Pandu Rangan, A. K. Banerjee. Lattice Based Efficient Threshold Public Key Encryption Scheme |
108 | -- | 121 | Jiwan Seo, Seungjin Choi, Mucheol Kim, Sangyong Han. The Method of Personalized Recommendation with Ensemble Combination |