256 | -- | 269 | Salmin Sultana, Gabriel Ghinita, Elisa Bertino, Mohamed Shehab. A Lightweight Secure Scheme for Detecting Provenance Forgery and Packet DropAttacks in Wireless Sensor Networks |
270 | -- | 283 | Andrea Ceccarelli, Leonardo Montecchi, Francesco Brancati, Paolo Lollini, Angelo Marguglio, Andrea Bondavalli. Continuous and Transparent User Identity Verification for Secure Internet Services |
284 | -- | 297 | Michael Le, Yuval Tamir. Fault Injection in Virtualized Systems - Challenges and Applications |
298 | -- | 311 | Qi Li, Xinwen Zhang, Xin Zhang, Purui Su. Invalidating Idealized BGP Security Proposals and Countermeasures |
312 | -- | 325 | Juan E. Tapiador, Agustín Orfila, Arturo Ribagorda, Benjamín Ramos. Key-Recovery Attacks on KIDS, a Keyed Anomaly Detection System |
326 | -- | 337 | Aditi Gupta 0002, Javid Habibi, Michael S. Kirkpatrick, Elisa Bertino. Marlin: Mitigating Code Reuse Attacks Using Code Randomization |
338 | -- | 350 | Alex Klinkhamer, Ali Ebnenasir. On the Hardness of Adding Nonmasking Fault Tolerance |
351 | -- | 365 | Sisi Liu, Loukas Lazos, Marwan Krunz. Time-Delayed Broadcasting for Defeating Inside Jammers |
366 | -- | 372 | Antonio Bovenzi, Francesco Brancati, Stefano Russo, Andrea Bondavalli. An OS-level Framework for Anomaly Detection in Complex Software Systems |
373 | -- | 374 | Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi. On the Security of A Privacy-Preserving Product Calculation Scheme |