Abstract is missing.
- Welcome messageSushil Jajodia, Wenjing Lou, Wade Trappe. 1-2 [doi]
- Dynamic adaptive anti-jamming via controlled mobilityXiaofan He, Huaiyu Dai, Peng Ning. 1-9 [doi]
- PHY-layer authentication by introducing controlled inter symbol interferenceVireshwar Kumar, Jung-Min Park 0001, T. Charles Clancy, Kaigui Bian. 10-18 [doi]
- Secure cooperative spectrum sensing in cognitive radio networks using interference signaturesSunghyun Choi, Kang G. Shin. 19-27 [doi]
- Competing Mobile Network Game: Embracing antijamming and jamming strategies with reinforcement learningYoungjune Gwon, Siamak Dastangoo, Carl Fossa, H. T. Kung. 28-36 [doi]
- T-dominance: Prioritized defense deployment for BYOD securityWei Peng, Feng Li, Keesook J. Han, Xukai Zou, Jie Wu 0001. 37-45 [doi]
- On the impact of social botnets for spam distribution and digital-influence manipulationJinxue Zhang, Rui Zhang 0007, Yanchao Zhang, Guanhua Yan. 46-54 [doi]
- NOMAD: Towards non-intrusive moving-target defense against web botsShardul Vikram, Chao Yang, Guofei Gu. 55-63 [doi]
- Gangs of the internet: Towards automatic discovery of peer-to-peer communitiesLiyun Li, Suhas Mathur, Baris Coskun. 64-72 [doi]
- A game-theoretic approach for deceiving Remote Operating System FingerprintingMohammad Ashiqur Rahman, Mohammad Hossein Manshaei, Ehab Al-Shaer. 73-81 [doi]
- Leveraging the crowds to disrupt phishingJason Gustafson, Jun Li. 82-90 [doi]
- Low-complexity secure protocols to defend cyber-physical systems against network isolation attacksDong-Hoon Shin, Jinkyu Koo, Lei Yang, Xiaojun Lin, Saurabh Bagchi, Junshan Zhang. 91-99 [doi]
- Secure pervasive social networking based on multi-dimensional trust levelsZheng Yan, Mingjun Wang, Valtteri Niemi, Raimo Kantola. 100-108 [doi]
- A vulnerability study of geographic routing in Underwater Acoustic NetworksMichael Zuba, Michael Fagan, Jun-Hong Cui, Zhijie Jerry Shi. 109-117 [doi]
- Privacy-preserving revocable content sharing in geosocial networksLinke Guo, Chi Zhang, Yuguang Fang. 118-126 [doi]
- Towards self-healing smart grid via intelligent local controller switching under jammingHongbo Liu, Yingying Chen, Mooi Choo Chuah, Jie Yang 0003. 127-135 [doi]
- Certificateless public auditing for data integrity in the cloudBoyang Wang, Baochun Li, Hui Li, FengHua Li. 136-144 [doi]
- Secure and constant cost public cloud storage auditing with deduplicationJiawei Yuan, Shucheng Yu. 145-153 [doi]
- A cooperative botnet profiling and detection in virtualized environmentShun-Wen Hsiao, Yi-Ning Chen, Yeali S. Sun, Meng Chang Chen. 154-162 [doi]
- A lightweight argument system with efficient verifierGang Xu, George T. Amariucai, Yong Guan. 163-171 [doi]
- CloudSafe: Securing data processing within vulnerable virtualization environments in the cloudHuijun Xiong, Qingji Zheng, Xinwen Zhang, Danfeng Yao. 172-180 [doi]
- Energy-efficient, secure group key agreement for ad hoc networksThomas R. Halford, Thomas A. Courtade, Keith M. Chugg. 181-188 [doi]
- Privacy-preserving item-based Collaborative Filtering using semi-distributed Belief PropagationJun Zou, Arash Einolghozati, Faramarz Fekri. 189-197 [doi]
- Exponential secrecy against unbounded adversary using joint encryption and privacy amplificationYahya Sowti Khiabani, Shuangqing Wei. 198-206 [doi]
- On the secrecy capacity of the space-division multiplexed fiber optical communication systemsKyle Guan, Peter J. Winzer, Emina Soljanin, Antonia Maria Tulino. 207-214 [doi]
- Efficient codes for Limited View adversarial channelsReihaneh Safavi-Naini, Pengwei Wang. 215-223 [doi]
- Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.orgAmir Herzberg, Haya Shulman. 224-232 [doi]
- Secure hierarchical Virtual Private LAN Services for provider provisioned networksMadhusanka Liyanage, Mika Ylianttila, Andrei Gurtov. 233-241 [doi]
- Byzantine robustness, hierarchy, and scalabilityRadia J. Perlman, Charlie Kaufman. 242-250 [doi]
- A viewable e-voting scheme for environments with conflict of interestHuian Li, Yan Sui, Wei Peng, Xukai Zou, Feng Li. 251-259 [doi]
- Efficient Random Route Mutation considering flow and network constraintsQi Duan, Ehab Al-Shaer, Jafar Haadi Jafarian. 260-268 [doi]
- EasyScale: Easy mapping for large-scale network security experimentsWei-Min Yao, Sonia Fahmy, Jiahong Zhu. 269-277 [doi]
- A moving target defense mechanism for MANETs based on identity virtualizationMassimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Kun Sun. 278-286 [doi]
- Identifying high-cardinality hosts from network-wide traffic measurementsYang Liu, Wenji Chen, Yong Guan. 287-295 [doi]
- LISA: Location information ScrAmbler for privacy protection on smartphonesZhigang Chen, Xin Hu, Xiaoen Ju, Kang G. Shin. 296-304 [doi]
- A passive technique for fingerprinting wireless devices with Wired-side ObservationsA. Selcuk Uluagac, Sakthi V. Radhakrishnan, Cherita Corbett, Antony Baca, Raheem A. Beyah. 305-313 [doi]
- Scalable hardware monitors to protect network processors from data plane attacksKekai Hu, Harikrishnan Chandrikakutty, Russell Tessier, Tilman Wolf. 314-322 [doi]
- Using instruction sequence abstraction for shellcode detection and attributionZiming Zhao, Gail-Joon Ahn. 323-331 [doi]
- Limitations to threshold random walk scan detection and mitigating enhancementsPeter Mell, Richard E. Harang. 332-340 [doi]
- Harvesting unique characteristics in packet sequences for effective application classificationZhenlong Yuan, Yibo Xue, Yingfei Dong. 341-349 [doi]
- Sketch-based multidimensional IDS: A new approach for network anomaly detectionChristian Callegari, Alessandro Casella, Stefano Giordano, Michele Pagano, Teresa Pepe. 350-358 [doi]
- Simulating attack behaviors in enterprise networksStephen Moskal, Derek Kreider, Lydia Hays, Ben Wheeler, Shanchieh Jay Yang, Michael E. Kuhl. 359-360 [doi]
- Performance of interval-based features for anomaly detection in network trafficKriangkrai Limthong. 361-362 [doi]
- ISP traceback - Attack path detectionBjörn Stelte. 363-364 [doi]
- DNSSEC: Security and availability challengesAmir Herzberg, Haya Shulman. 365-366 [doi]
- Provenance of exposure: Identifying sources of leaked documentsChristian S. Collberg, Aaron Gibson, Sam Martin, Nitin Shinde, Amir Herzberg, Haya Shulman. 367-368 [doi]
- FADEC: Fast authentication for dynamic electric vehicle chargingHongyang Li, György Dán, Klara Nahrstedt. 369-370 [doi]
- Cloud of Secure Elements perspectives for mobile and cloud applications securityPascal Urien. 371-372 [doi]
- Privacy-preserving handover mechanism in 4GHasen Nicanfar, Javad Hajipour, Farshid Agharebparast, Peyman TalebiFard, Victor C. M. Leung. 373-374 [doi]
- Design and implementation of a Skype Protocol AnalyzerRay-Guang Cheng, Po-Yao Tsai, Ping-Chen Lin, Chia-Liang Lian, Tse-Han Liu, Hsien-Cheng Chou, Shiao Li Tsao, Shanchieh Yang. 375-376 [doi]
- S-Match: An efficient privacy-preserving profile matching schemeXiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah. 377-378 [doi]
- A novel detection scheme for malicious nodes in smart meter systemHong Wen, Xiaochun Zhang, Lei Cai, Jie Tang, XiPing Zhu, Yixin Jiang, Xiaobin Guo. 379-380 [doi]
- Dynamic control for cooperative jamming with a non-altruistic nodeYunus Sarikaya, Özgür Erçetin, Özgür Gürbüz. 381-382 [doi]
- The security issue of WSNs based on cloud computingYuanpeng Xie, Jinsong Zhang, Ge Fu, Hong Wen, Qiyi Han, XiPing Zhu, Yixin Jiang, Xiaobin Guo. 383-384 [doi]
- Locating Tor hidden services through an interval-based traffic-correlation attackJuan A. Elices, Fernando Pérez-González. 385-386 [doi]
- Characterization of the dynamics and interactions of domain names and name serverMansurul Bhuiyan, Aziz Mohaisen, Yannis Labrou, Mohammad Al Hasan. 387-388 [doi]
- Sequential modeling for obfuscated network attack action sequencesHaitao Du, Shanchieh Jay Yang. 389-390 [doi]
- User-adaptive energy-aware security for mobile devicesSriram Sankaran, Ramalingam Sridhar. 391-392 [doi]
- Providing context-based security for inter-organizational electronic business processesMaurizio Talamo, Franco Arcieri, Christian H. Schunck, Andrea Callia D'Iddio. 393-394 [doi]
- A P2P recommended trust nodes selection algorithm based on topological potentialQiyi Han, Lin Yu, Rui Zhang, Hong Wen, Yuanpeng Xie, XiPing Zhu, Yixin Jiang, Xiaobin Guo. 395-396 [doi]
- Secure Zones: An Attribute-Based Encryption advisory system for safe firearmsMarcos Portnoi, Chien-Chung Shen. 397-398 [doi]
- ADAM: Automated detection and attribution of malicious webpagesAhmed E. Kosba, Aziz Mohaisen, Andrew G. West, Trevor Tonn. 399-400 [doi]
- Maintaining trajectory privacy in mobile wireless sensor networksOsman Kiraz, Albert Levi. 401-402 [doi]
- An architecture for supervising COTS productsRobert Koch 0002, Mario Golling, Gabi Dreo Rodosek. 403-404 [doi]
- Location-aware sign-on and key exchange using attribute-based encryption and Bluetooth beaconsMarcos Portnoi, Chien-Chung Shen. 405-406 [doi]
- Babble: Identifying malware by its dialectsAziz Mohaisen, Omar Alrawi, Andrew G. West, Allison Mankin. 407-408 [doi]
- Attracting sophisticated attacks to secure systems: A new honeypot architectureRobert Koch 0002, Mario Golling, Gabi Dreo Rodosek. 409-410 [doi]
- NICE: Network Introspection by Collaborating EndpointsDarrell M. Kienzle, Nathan S. Evans, Matthew C. Elder. 411-412 [doi]
- An efficient and secure search database scheme for cloud computing in smart gridYixin Jiang, Xiaobin Guo, Chao Li, Hong Wen, Cai Lei, Zhang Rui. 413-414 [doi]
- Safe configuration of TLS connectionsMichael Atighetchi, Nathaniel Soule, Partha Pratim Pal, Joseph P. Loyall, Asher Sinclair, Robert Grant. 415-422 [doi]
- A secure architecture design based on application isolation, code minimization and randomizationAditi Gupta 0002, Michael S. Kirkpatrick, Elisa Bertino. 423-429 [doi]
- Wireless spreading of WiFi APs infections using WPS flaws: An epidemiological and experimental studyAmirali Sanatinia, Sashank Narain, Guevara Noubir. 430-437 [doi]
- Discovering emergent norms in security logsOlgierd Pieczul, Simon N. Foley. 438-445 [doi]
- Challenge tracing and mitigation under partial information and uncertaintyChristian Doerr. 446-453 [doi]
- Avoiding inconsistencies in the Security Content Automation ProtocolWilliam M. Fitzgerald, Simon N. Foley. 454-461 [doi]
- A framework for risk-aware role based access controlKhalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu. 462-469 [doi]
- Objective metrics for firewall security: A holistic viewMohammed Noraden Alsaleh, Saeed Al-Haj, Ehab Al-Shaer. 470-477 [doi]
- Aggregated representations and metrics for scalable flow analysisJérôme François, Radu State, Thomas Engel. 478-482 [doi]
- A specification method for analyzing fine grained network security mechanism configurationsHicham El Khoury, Romain Laborde, François Barrère, Abdelmalek Benzekri, Maroun Chamoun. 483-487 [doi]
- A cloud computing based architecture for cyber security situation awarenessWei Yu, Guobin Xu, Zhijiang Chen, Paul Moulema. 488-492 [doi]
- Looking at the overheads of transmitting encrypted data to the cloudYufeng Wang, Chiu Chiang Tan. 493-497 [doi]
- Rootkit detection on virtual machines through deep information extraction at hypervisor-levelXiongwei Xie, Weichao Wang. 498-503 [doi]
- Computing encrypted cloud data efficiently under multiple keysBoyang Wang, Ming Li, Sherman S. M. Chow, Hui Li. 504-513 [doi]
- Towards auditable cloud-assisted access of encrypted health dataYue Tong, Jinyuan Sun, Sherman S. M. Chow, Pan Li 0001. 514-519 [doi]
- Flexible and publicly verifiable aggregation query for outsourced databases in cloudJiawei Yuan, Shucheng Yu. 520-524 [doi]