Abstract is missing.
- Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor networkPranav Krishnamoorthy, Matthew Wright. 1-7 [doi]
- Eliminating routing protocol anomalies in wireless sensor networks using AI techniquesZorana Bankovic, Juan Carlos Vallejo, Pedro Malagón, Álvaro Araujo, José Manuel Moya. 8-13 [doi]
- Empirical evaluation of authorship obfuscation using JGAAPPatrick Juola, Darren Vescovi. 14-18 [doi]
- Towards security policy decisions based on context profilingMarkus Miettinen, N. Asokan. 19-23 [doi]
- The limits of automatic OS fingerprint generationDavid W. Richardson, Steven D. Gribble, Tadayoshi Kohno. 24-34 [doi]
- Relational network-service clustering analysis with set evidencesLi Pu, Boi Faltings, Qiang Yang, Derek Hao Hu. 35-44 [doi]
- Synthetic security policy generation via network traffic clusteringTaghrid Samak, Ehab Al-Shaer. 45-53 [doi]
- Lexical feature based phishing URL detection using online learningAaron Blum, Brad Wardman, Thamar Solorio, Gary Warner. 54-60 [doi]
- Cheap and automated socio-technical attacks based on social networking sitesMarkus Huber, Martin Mulazzani, Sebastian Schrittwieser, Edgar Weippl. 61-64 [doi]
- Adjustable autonomy for cross-domain entitlement decisionsJacob Beal, Jonathan Webb, Michael Atighetchi. 65-71 [doi]