Abstract is missing.
- Biobjective NSGA-II for optimal spread spectrum watermarking of color frames: Evaluation studyEl-Sayed M. El-Alfy, Asem A. Ghaleb. 1-8 [doi]
- G-NAS: A grid-based approach for negative authenticationDipankar Dasgupta, Denise Ferebee, Sanjib Saha, Abhijit Kumar Nag, Kul Prasad Subedi, Alvaro Madero, Abel Sanchez, John R. Williams. 9-18 [doi]
- User identification through command history analysisFoaad Khosmood, Phillip L. Nico, Jonathan Woolery. 19-25 [doi]
- Quantifying the impact of unavailability in cyber-physical environmentsAnis Ben Aissa, Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili. 26-33 [doi]
- Automated testing for cyber threats to ad-hoc wireless networksKarel P. Bergmann, Jörg Denzinger. 34-41 [doi]
- Automatic attack surface reduction in next-generation industrial control systemsSebastian Obermeier, Michael Wahler, Thanikesavan Sivanthi, Roman Schlegel, Aurelien Monot. 42-49 [doi]
- Supervised learning to detect DDoS attacksEray Balkanli, Jander Alves, A. Nur Zincir-Heywood. 50-57 [doi]
- Benchmarking two techniques for Tor classification: Flow level and circuit level classificationKhalid Shahbar, A. Nur Zincir-Heywood. 58-65 [doi]
- Spark-based anomaly detection over multi-source VMware performance data in real-timeMohiuddin Solaimani, Mohammed Iftekhar, Latifur Khan, Bhavani M. Thuraisingham, Joey Burton Ingram. 66-73 [doi]
- A theoretical Q-learning temporary security repairArisoa S. Randrianasolo, Larry D. Pyeatt. 74-80 [doi]
- The analysis of feature selection methods and classification algorithms in permission based Android malware detectionUgur Pehlivan, Nuray Baltaci, Cengiz Acartürk, Nazife Baykal. 81-88 [doi]
- A novel bio-inspired predictive model for spam filtering based on dendritic cell algorithmEl-Sayed M. El-Alfy, Ali A. Al-Hasan. 89-95 [doi]
- A genetic programming approach for fraud detection in electronic transactionsCarlos A. S. Assis, Adriano César Machado Pereira, Marconi de Arruda Pereira, Eduardo G. Carrano. 96-103 [doi]