Abstract is missing.
- Performance Analysis of Vertically Partitioned Data in Clouds Through a Client-Based In-Memory Key-Value Store CacheJens Kohler, Thomas Specht. 3-13 [doi]
- Formalizing Agents' Beliefs for Cyber-Security Defense Strategy PlanningKarsten Martiny, Alexander Motzek, Ralf Möller. 15-25 [doi]
- Automatic Classification and Detection of Snort Configuration Anomalies - a Formal ApproachAmina Saadaoui, Hajar Benmoussa, Adel Bouhoula, Anas Abou El Kalam. 27-39 [doi]
- An Improved Bat Algorithm Driven by Support Vector Machines for Intrusion DetectionAdriana-Cristina Enache, Valentin Sgarciu. 41-51 [doi]
- A Formal Approach Based on Verification and Validation Techniques for Enhancing the Integrity of Concrete Role Based Access Control PoliciesFaouzi Jaïdi, Faten Labbene-Ayachi. 53-64 [doi]
- Real-Time Hybrid Compression of Pattern Matching Automata for Heterogeneous Signature-Based Intrusion DetectionCiprian Pungila, Viorel Negru. 65-74 [doi]
- Adaptive Watermarking Algorithm of Color Images of Ancient Documents on YIQ-PCA Color SpaceMohamed Neji Maatouk, Najoua Essoukri Ben Amara. 75-86 [doi]
- Planar Multi-classifier Modelling-NN/SVM: Application to Off-line Handwritten Signature VerificationImen Abroug Ben Abdelghani, Najoua Essoukri Ben Amara. 87-97 [doi]
- Email Spam Filtering Using the Combination of Two Improved Versions of Support Vector Domain DescriptionMohamed el Boujnouni, Mohamed Jedra, Noureddine Zahid. 99-109 [doi]
- Performance of the Cryptanalysis over the Shrinking GeneratorSara D. Cardell, Amparo Fúster-Sabater. 111-121 [doi]
- On the (Non)Improvement of an Authenticated GKT ProtocolRuxandra F. Olimid. 123-132 [doi]
- A Heterogeneous Fault-Resilient Architecture for Mining Anomalous Activity Patterns in Smart HomesCiprian Pungila, Bogdan Manate, Viorel Negru. 133-143 [doi]
- Investigating the Impacts of Brain Conditions on EEG-Based Person IdentificationDinh Phung, Dat Tran, Wanli Ma, Tien Pham. 145-155 [doi]
- Conditional Entropy Approach to Multichannel EEG-Based Person IdentificationDinh Phung, Dat Tran, Wanli Ma, Tien Pham. 157-165 [doi]
- On the Selection of Key Features for Android Malware CharacterizationJavier Sedano, Camelia Chira, Silvia González, Álvaro Herrero, Emilio Corchado, José Ramón Villar. 167-176 [doi]
- Performance Analysis of User to Root Attack Class Using Correlation Based Feature Selection ModelShilpa Bahl, Sudhir Kumar Sharma. 177-187 [doi]
- CIOSOS: Combined Idiomatic-Ontology Based Sentiment Orientation System for Trust Reputation in E-commerceHasnae Rahimi, Hanan El Bakkali. 189-200 [doi]
- Neural Analysis of HTTP Traffic for Web Attack DetectionDavid Atienza, Álvaro Herrero, Emilio Corchado. 201-212 [doi]
- Analysis and Automation of Handwritten Word Level Script RecognitionM. Ravikumar, S. Manjunath, D. S. Guru. 213-225 [doi]
- Patterns Extraction Method for Anomaly Detection in HTTP TrafficRafal Kozik, Michal Choras, Rafal Renk, Witold Holubowicz. 227-236 [doi]
- Feature Selection for Hand-Shape Based IdentificationMuhammad Hussain, Awabed Jibreen, Hatim A. Aboalsmah, Hassan Madkour, George Bebis, Gholamreza Amayeh. 237-246 [doi]
- Designing and Modeling the Slow Next DoS AttackEnrico Cambiaso, Gianluca Papaleo, Giovanni Chiola, Maurizio Aiello. 249-259 [doi]
- Non-Interactive Authentication and Confidential Information Exchange for Mobile EnvironmentsFrancisco Martín-Fernández, Pino Caballero-Gil, Cándido Caballero-Gil. 261-271 [doi]
- Spatio-Temporal Spreading of Mobile Malware: A Model Based on Difference EquationsÁngel Martín del Rey, Ascensión Hernández Encinas, J. Martín-Vaquero, A. Queiruga Dios, G. Rodríguez Sánchez. 273-283 [doi]
- Privacy-Preserving Protocol for Smart Space Services with Negotiable Comfort PreferencesAdam Wójtowicz, Daniel Wilusz. 285-295 [doi]
- An Intermediate Approach to Spritz and RC4Rafael Álvarez, Antonio Zamora. 297-307 [doi]
- An Efficient Identity-Based Proxy Signature Scheme in the Standard Model with Tight ReductionXiaoming Hu, Hong Lu, Huajie Xu, Jian Wang, Yinchun Yang. 309-319 [doi]
- A New Metric for Proficient Performance Evaluation of Intrusion Detection SystemPreeti Aggarwal, Sudhir Kumar Sharma. 321-331 [doi]
- Clustering and Neural Visualization for Flow-Based Intrusion DetectionRaúl Marticorena Sánchez, Álvaro Herrero, Emilio Corchado. 333-345 [doi]
- SW-SSS: Slepian-Wolf Coding-Based Secret Sharing SchemeKazumasa Omote, Tran Thao Phuong. 347-365 [doi]
- An Efficient RFID Distance Bounding ProtocolLi Zhai, Chuankun Wu. 367-376 [doi]
- A New Approach to Compressed File Fragment IdentificationKhoa Nguyen, Dat Tran, Wanli Ma, Dharmendra Sharma. 377-387 [doi]
- The Evolution of Permission as Feature for Android Malware DetectionJosé Gaviria de la Puerta, Borja Sanz, Igor Santos Grueiro, Pablo Garcia Bringas. 389-400 [doi]
- Pollution Attacks Detection in the P2PSP Live Streaming SystemCristóbal Medina-López, L. G. Casado, Vicente González Ruiz. 401-410 [doi]
- Group Signatures in PracticeV. Gayoso Martínez, Luis Hernández Encinas, Seok-Zun Song. 413-423 [doi]
- Non-conventional Digital Signatures and Their Implementations - A ReviewDavid Arroyo, Jesus Diaz, Francisco B. Rodriguez. 425-435 [doi]
- Using Smart Cards for Authenticating in Public Services: A Comparative StudyD. Arroyo Guardeño, V. Gayoso Martínez, L. Hernández Encinas, A. Martín Muñoz. 437-446 [doi]
- Reducing the Key Space of an Image Encryption Scheme Based on Two-Round Diffusion ProcessAlberto Peinado, Andrés Ortiz García. 447-453 [doi]
- On the Difficult Tradeoff Between Security and Privacy: Challenges for the Management of Digital IdentitiesDavid Arroyo, Jesus Diaz, Víctor Gayoso. 455-462 [doi]
- GOTCHA Challenge (Un)SolvedRuxandra F. Olimid. 465-472 [doi]
- Tracking Users Like There is No Tomorrow: Privacy on the Current InternetIskander Sánchez-Rola, Xabier Ugarte-Pedrero, Igor Santos, Pablo Garcia Bringas. 473-483 [doi]
- A Practical Framework and Guidelines to Enhance Cyber Security and PrivacyMichal Choras, Rafal Kozik, Rafal Renk, Witold Holubowicz. 485-495 [doi]
- An Analysis of the Effectiveness of Personalized Spam Using Online Social Network Public InformationEnaitz Ezpeleta, Urko Zurutuza, José María Gómez Hidalgo. 497-506 [doi]
- European Computer Science (ECS)Wolfgang Gerken. 509-516 [doi]
- Better Careers for Transnational European Students? - A Case Study for French-German Diploma AlumniGabriel Michel, Véronique Jeanclaude, Sorin Stratulat. 517-524 [doi]
- Impact Level Within the English Friendly Program in Virtual Degrees at the University of Burgos. A Real Case Scenario of Transnational EducationAna María Lara Palma, José María Cámara Nebreda, Elena María Vicente Domingo. 525-532 [doi]
- A New Way to Improve Subject Selection in Engineering Degree StudiesJ. A. López-Vázquez, José Antonio Orosa, José Luís Calvo-Rolle, F. J. de Cos Juez, J. L. Castelerio-Roca, A. M. Costa. 533-545 [doi]
- Quality Uncertainty and Market Failure: An Interactive Model to Conduct Classroom ExperimentsMaría Pereda, David Poza, José Ignacio Santos, José Manuel Galán. 549-557 [doi]
- Public Access Architecture Design of an FPGA-Hardware-Based Nervous System Emulation Remote LabGorka Epelde, Andoni Mujika, Peter Leskovský, Alessandro De Mauro. 559-569 [doi]
- Education Apps. One Step Beyond: It's Time for Something More in the Education Apps WorldFrancisco J. Cardenal, Vivian F. López. 571-581 [doi]
- Self-Assessment Web Tool for Java ProgrammingBruno Baruque, Álvaro Herrero. 583-592 [doi]
- Building Augmented Reality Presentations with Web 2.0 ToolsKrzysztof Walczak, Wojciech Wiza, Rafal Wojciechowski, Adam Wójtowicz, Dariusz Ruminski, Wojciech Cellary. 595-605 [doi]
- Illustrating Abstract Concepts by Means of Virtual Learning ArtifactsDavid Griol, José M. Manuel Molina. 607-616 [doi]
- Mining Skills from Educational Data for Project RecommendationsPavel Kordík, Stanislav Kuznetsov. 617-627 [doi]
- Virtual Teams in Higher Education: A Review of Factors Affecting Creative PerformanceTeresa Torres-Coronas, Mario Arias Oliva, Juan Carlos Yáñez Luna, Ana María Lara Palma. 629-637 [doi]