Abstract is missing.
- VISNU: A Novel Visualization Methodology of Security Events Optimized for a Centralized SOCTaewoong Kwon, Jungsuk Song, Sangsu Choi, Yunsoo Lee, Jinhak Park. 1-7 [doi]
- Protecting Struts 2 from OGNL Related Attacks by Using Servlet FilterMariko Fujimoto, Wataru Matsuda, Takuho Mitsunaga. 8-14 [doi]
- Time Series Analysis of Copy-and-Paste Impact on Android Application SecurityHironori Imai, Akira Kanaoka. 15-22 [doi]
- Efficient Card-Based Cryptographic Protocols for the Millionaires' Problem Using Private Input OperationsHibiki Ono, Yoshifumi Manabe. 23-28 [doi]
- An Efficient Oblivious Transfer Protocol with Access ControlYaqing Liao, Jing Zhou, Yang Yang, Ou Ruan. 29-34 [doi]
- Transformation between Attribute-Based Encryption and Key-Aggregate CryptosystemChun-I Fan, Yi-Fan Tseng, Cheng-Yuan E, Jheng-Jia Huang. 35-41 [doi]
- Toward a Resilient System: The Inspiration from Information Security Management ApplianceMing Xu, Yu Cheng, QiXin Yin. 42-46 [doi]
- Helping Johnny to Search: Encrypted Search on Webmail SystemTatsuya Midorikawa, Akihiro Tachikawa, Akira Kanaoka. 47-53 [doi]
- An Algorithm Based on Influence to Predict Invisible RelationshipJunfeng Tian, Lizheng Xue, HongYun Cai. 54-61 [doi]
- Trust Elevation Scheme Based on Entropy-Specific Biometric Authentication Methods for the Financial SectorJi Hye Kim, Mee Yeon Kim, Heung-Youl Youm. 62-68 [doi]
- Power Attack and Protected Implementation on Lightweight Block Cipher SKINNYJing Ge, Yifan Xu, Ruiqian Liu, Enze Si, Ning Shang, an Wang. 69-74 [doi]
- Load Balancing Method Based on a Performance and Power RatioJunfeng Tian, Yanwei Ma. 75-82 [doi]
- A Survey of Return-Oriented Programming Attack, Defense and Its Benign UseJingyuan Wang, Peidai Xie, Yongjun Wang, Zelin Rong. 83-88 [doi]
- Evaluating Disassembly-Code Based Similarity between IoT Malware SamplesRyoichi Isawa, Tao Ban, Ying Tie, Katsunari Yoshioka, Daisuke Inoue. 89-94 [doi]
- Development of White List Based Autonomous Evolution of Defense System for RAT MalwareTomohiro Shigemoto, Shota Fujii, Ichiro Kuriama, Tetsuro Kito, Hirofumi Nakakoji, Yasuhiro Fujii, Hiroaki Kikuchi. 95-101 [doi]
- A Lightweight Host-Based Intrusion Detection Based on Process Generation PatternsYu Tsuda, Junji Nakazato, Yaichiro Takagi, Daisuke Inoue, Koji Nakao, Kenjiro Terada. 102-108 [doi]
- Constructing a Complete Timeline of a Security Incident by Aggregating ReportsHiroki Kuzuno, Shun Inagaki, Kenichi Magata. 109-115 [doi]