Abstract is missing.
- A discussion on Internet GovernanceFuad Khan Baloch, Brian Cusack. 1-7 [doi]
- Cross-domain vulnerabilities over social networksCatherine Bernard, Hervé Debar, Salim Benayoune. 8-13 [doi]
- Informativity-based graph: Exploring mutual kNN and labeled vertices for semi-supervised learningLilian Berton, Alneu de Andrade Lopes. 14-19 [doi]
- Primary role identification in e-mail networks using pattern subgraphs and sequence diagramsRadoslaw Brendel, Henryk Krawczyk. 20-25 [doi]
- Event detection in evolving networksSarvenaz Choobdar, Pedro Manuel Pinto Ribeiro, Fernando M. A. Silva. 26-32 [doi]
- Estimating network parameters using random walksColin Cooper, Tomasz Radzik, Yiannis Siantos. 33-40 [doi]
- Graphical analysis of social group dynamicsBogdan Gliwa, Anna Zygmunt, Aleksander Byrski. 41-46 [doi]
- Logical push framework for real-time SNS processingYoonjae Lee, Junseok Oh, Bong Gyou Lee. 47-51 [doi]
- Automatic sentiment analysis of Twitter messagesAna C. E. S. Lima, Leandro N. de Castro. 52-57 [doi]
- Machine learning algorithms applied in automatic classification of social network usersBruno Vicente Alves de Lima, Vinicius Ponte Machado. 58-62 [doi]
- What does everybody know? Identifying event-specific sources from social mediaDebanjan Mahata, Nitin Agarwal. 63-68 [doi]
- Quantifying social network dynamicsRadoslaw Michalski, Piotr Bródka, Przemyslaw Kazienko, Krzysztof Juszczyszyn. 69-74 [doi]
- Graph-based cross-validated committees ensemblesNils Ever Murrugarra Llerena, Lilian Berton, Alneu de Andrade Lopes. 75-80 [doi]
- 1; the right choice for wireless data-based communication services?Soo Kyung Park, Jeong Ho Kwak, Bong Gyou Lee. 81-86 [doi]
- Representing scientific associations through the lens of Actor-Network TheoryAlysson Bolognesi Prado, Maria Cecília Calani Baranauskas. 87-92 [doi]
- Detection of head experts in social networkMartin Radvanský, Milos Kudelka, Václav Snásel. 93-98 [doi]
- Performance of Modified Iterative Decoding Algorithm for Multilevel codesAtta-ur-Rahman. 99-104 [doi]
- Identifying focal patterns in social networksFatih Sen, Rolf T. Wigand, Nitin Agarwal, Debanjan Mahata, Halil Bisgin. 105-108 [doi]
- RunMyCode: An innovative platform for social production and evaluation of scientific researchLayth Sliman, Benoit Charroux, Yvan Stroppa. 109-114 [doi]
- Solving maximum clique problem in stochastic graphs using learning automataMohammad Soleimani-Pouri, Alireza Rezvanian, Mohammad Reza Meybodi. 115-119 [doi]
- DIFSoN: Discovering influential friends from social networksSyed Khairuzzaman Tanbeer, Carson Kai-Sang Leung, Juan J. Cameron. 120-125 [doi]
- An algorithm to achieve k-anonymity and l-diversity anonymisation in social networksBala Krushna Tripathy, Anirban Mitra. 126-131 [doi]
- Structural link prediction using community information on TwitterJorge Carlos Valverde-Rebaza, Alneu de Andrade Lopes. 132-137 [doi]
- Tweets mining for French Presidential ElectionKatarzyna Wegrzyn-Wolska, Lamine Bougueroua. 138-143 [doi]
- Social network indices as performance predictors in a virtual organizationRolf T. Wigand, Nitin Agarwal, O. Isaac Osesina, Winfried Hering, M. Audrey Korsgaard, Arnold Picot, Marcus A. Drescher. 144-149 [doi]
- Mingle spontaneous social networkDante Zaupa, Cristiano André da Costa, Jessica Silva, Jorge L. V. Barbosa, Adenauer C. Yamin. 150-154 [doi]
- Comparing two local methods for community detection in social networksSarka Zehnalova, Milos Kudelka, Milos Kudelka, Václav Snásel. 155-160 [doi]
- Social media in the context of academic marketing: Case study: Evaluation of the Umwelt-Campus campaignLisa Ziemer, Tina Stahlschmidt, Norbert Kuhn. 161-166 [doi]
- Biometric access control for wireless nodesOhood Althobaiti, Mznah Al-Rodhaan, Abdullah Al-Dhelaan. 167-174 [doi]
- Evaluation of quality in encrypted VoIP callsDherik Barison, Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Gean Davis Breda, Leonardo de Souza Mendes. 175-180 [doi]
- Boosting Optimum-Path Forest clustering through harmony Search and its applications for intrusion detection in computer networksKelton A. P. Costa, Clayton R. Pereira, Rodrigo Nakamura, Luis A. M. Pereira, João Paulo Papa. 181-185 [doi]
- Threats models on biometri systems: A comparative studyDellys Hachemi Nabil, Karima Benatchba, Mouloud Koudil, Bouridane Ahmed. 186-191 [doi]
- Ontology-based Negotiation of security requirements in cloudLoredana Liccardo, Massimiliano Rak, Giuseppe Di Modica, Orazio Tomarchio. 192-197 [doi]
- Benefits and challenges of three cloud computing service modelsJoel Gibson, Robin Rondeau, Darren Eveleigh, Qing Tan. 198-205 [doi]
- A simple and secure watermarking protocolAntonio Cuomo, Franco Frattolillo, Federica Landolfi, Umberto Villano. 206-211 [doi]
- Security controls for AndroidRuben Jonathan Garcia Vargas, Eleazar Aguirre Anaya, Ramon Galeana Huerta, Alba Felix Moreno Hernandez. 212-216 [doi]
- Study of internet security threats among home usersUmesh Hodeghatta Rao Xavier, Bishwa Prakash Pati. 217-221 [doi]
- A credible cost-sensitive model for intrusion response selectionAderonke Ikuomola, Adesina Simon Sodiya. 222-227 [doi]
- Securing password recovery through dispersionSushil Jajodia, Witold Litwin, S. J. Thomas Schwarz. 228-233 [doi]
- Further cryptanalysis of 'A remote authentication scheme using mobile device'Muhammad Khurram Khan, Saru Kumari, Mridul Kumar Gupta. 234-237 [doi]
- An investigation of entropy of selectively encrypted bitmap imagesReine Lundin, Stefan Lindskog. 238-243 [doi]
- An intrusion detection framework for supporting SLA assessment in Cloud ComputingMassimo Ficco, Massimiliano Rak, Beniamino Di Martino. 244-249 [doi]
- Method for a two dimensional honeypot to deter web bots in commerce systemsN. Nassar, G. Miller. 250-256 [doi]
- Taxonomy of security risk assessment approaches for researchersEbenezer Paintsil. 257-262 [doi]
- Spam detection using compression and PSOMichal Prilepok, Tomas Jezowicz, Jan Platos, Václav Snásel. 263-270 [doi]
- One-Class Principal Component Classifier for anomaly detection in wireless sensor networkMurad A. Rassam, Anazida Zainal, Mohd Aizaini Maarof. 271-276 [doi]
- Fuzzy clustering: Determining the number of clustersHana Rezanková, Dusan Húsek. 277-282 [doi]
- A survivability model for object-oriented software systemsAdesina Simon Sodiya, Dada O. Aborisade, Aderonke Justina Ikuomola. 283-290 [doi]
- A look at hidden web pages in Italian public administrationsEnrico Sorio, Alberto Bartoli, Eric Medvet. 291-296 [doi]
- Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacksFrank Yeong-Sung Lin, Yu-Shun Wang, Jing-Wei Wang, Chi-Hsiang Chan. 297-302 [doi]
- Middleware architecture for cross-border eIDBernd Zwattendorfer, Ivo Sumelong, Herbert Leitold. 303-308 [doi]
- A fingerprinting system calls approach for intrusion detection in a cloud environmentSanchika Gupta, Padam Kumar, Anjali Sardana, Ajith Abraham. 309-314 [doi]
- A secure and lightweight approach for critical data security in cloudSanchika Gupta, Padam Kumar, Anjali Sardana, Ajith Abraham. 315-320 [doi]
- A reputation-based approach for consumer protection in Saudi ArabiaHmood Al-Dossari. 321-326 [doi]
- Recommendation of travelling plan for elderly people according to their abilities and preferencesBrahim Batouche, Damien Nicolas, Hedi Ayed, Djamel Khadraoui. 327-332 [doi]
- Characterizing and preventing chargebacks in next generation web payments servicesEvandro Caldeira, Gabriel Brandão, Adriano César Machado Pereira. 333-338 [doi]
- Ontologic audit trails mapping for detection of irregularities in payrollsSandir R. Campos, Ararigleno Almeida Fernandes, Rafael T. de Sousa Jr., Edison P. De Freitas, João Paulo C. Lustosa da Costa, Antonio Manuel Rubio Serrano, Daniel Da C. Rodrigues, Clauber T. Rodrigues. 339-344 [doi]
- A methodology for traffic shaping multiobjective optimization for next generation networkUlisses Cavalca, Caio Mesquista, Adriano César Machado Pereira, Eduardo G. Carrano. 345-350 [doi]
- Quality of service & process control: What is their efficiency in available IT products?Milena Janakova. 351-355 [doi]
- Web page classification based on Schema.org collectionJonas Krutil, Milos Kudelka, Václav Snásel. 356-360 [doi]
- Toward a lightweight framework for monitoring public cloudsKun Ma, Runyuan Sun, Ajith Abraham. 361-365 [doi]
- Ontology design towards web intelligence: A Sports Complex Ontology case studySanjay Kumar Malik, S. A. M. Rizvi. 366-371 [doi]
- Towards an automatic non-deterministic web Service Composition platformGeorge Markou, Ioannis Refanidis. 372-377 [doi]
- Performance assessment of XACML authorizations for Supply Chain Traceability Web ServicesMiguel L. Pardal, Mark Harrison, Sanjay Sarma, José Alves Marques. 378-383 [doi]
- Searching similar images - Vector quantization with S-treeJan Platos, Pavel Krömer, Václav Snásel, Ajith Abraham. 384-388 [doi]
- CommonGOV: A consolidate approach for governance of service-oriented architectureHaroldo Maria Teixeira Filho, Leonardo Guerreiro Azevedo. 389-394 [doi]