449 | -- | 450 | Christos Dimitrakakis, Tom Karygiannis, Aikaterini Mitrokotsa. Guest Editors' Introduction: Special Section on Learning, Games, and Security |
451 | -- | 462 | Robert Nix, Murat Kantarcioglu. Incentive Compatible Privacy-Preserving Distributed Classification |
463 | -- | 469 | Manas A. Pathak, Bhiksha Raj. Large Margin Gaussian Mixture Models with Differential Privacy |
470 | -- | 481 | Ye Zhu, Yuanchao Lu, Anil Vikram. On Privacy of Encrypted Speech Communications |
482 | -- | 493 | Adam Barth, Benjamin I. P. Rubinstein, Mukund Sundararajan, John C. Mitchell, Dawn Song, Peter L. Bartlett. A Learning-Based Approach to Reactive Security |
494 | -- | 511 | Jun-Won Ho, Matthew Wright, Sajal K. Das. ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing |
512 | -- | 525 | Meixing Le, Angelos Stavrou, Brent ByungHoon Kang. DoubleGuard: Detecting Intrusions in Multitier Web Applications |
526 | -- | 540 | Dianxiang Xu, Manghui Tu, Michael Sanford, Lijo Thomas, Daniel Woodraska, Weifeng Xu. Automated Security Test Generation with Formal Threat Models |
541 | -- | 555 | Zhiyong Shan, Xin Wang 0001, Tzi-cker Chiueh. Enforcing Mandatory Access Control in Commodity OS to Disable Malware |
556 | -- | 568 | Smitha Sundareswaran, Anna Cinzia Squicciarini, Dan Lin. Ensuring Distributed Accountability for Data Sharing in the Cloud |
569 | -- | 582 | Alessandro Mei, Julinda Stefa. Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals |
583 | -- | 596 | Mohamed Shehab, Said Marouf. Recommendation Models for Open Authorization |
597 | -- | 609 | Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino. Resilient Authenticated Execution of Critical Applications in Untrusted Environments |
610 | -- | 625 | Roberto Cortiñas, Felix C. Freiling, Marjan Ghajar-Azadanlou, Alberto Lafuente, Mikel Larrea, Lucia Draque Penso, Iratxe Soraluze Arriola. Secure Failure Detection and Consensus in TrustedPals |