Abstract is missing.
- An Approach to Mine Suspicious Domain Based on HTTP Automated Software Communication BehaviorManh Cong Tran, Yasuhiro Nakamura. 1-5 [doi]
- Analysis of Awareness Structures in Information Security SystemsMikhail Styugin. 6-10 [doi]
- Securing Official Account Twitter Using Social Media Management System: Accuracy of the Data and Information Publish with TwitterDwiki Jatikusumo, Hanny Hikmayanti H., Feriadi, Wendi Usino. 11-15 [doi]
- Development of Intellectual Network Forensic System LIFT against Targeted AttacksKazuki Hashimoto, Hiroyuki Hiruma, Takashi Matsumoto, Kosetus Kayama, Yoshio Kaikizaki, Hiroshi Yamaki, Tetsutaro Uehara, Ryôichi Sasaki. 16-21 [doi]
- Data Security Using LSB Steganography and Vigenere Chiper in an Android EnvironmentChyquitha Danuputri, Teddy Mantoro, Mardi Hardjianto. 22-27 [doi]
- Study on Countermeasures Using Mitigation Software against Vulnerability AttacksRyohei Koizumi, Ryôichi Sasaki. 28-33 [doi]
- Implementation of Secure Smart Grid as Critical Information Infrastructure in Indonesia: A Case Study in Smart Grid ElectricityAhmad Budi Setiawan, Aries Syamsudin, Ashwin Sasongko. 34-39 [doi]
- Proposal of a Method for Identifying the Infection Route for Targeted Attacks Based on Malware Behavior in a NetworkMakoto Sato, Akihiko Sugimoto, Naoki Hayashi, Yoshiaki Isobe, Ryôichi Sasaki. 40-45 [doi]
- Development of a Detection and Responding System for Malware Communications by Using OpenFlow and Its EvaluationNaoto Nakagawa, Yoshimi Teshigawara, Ryôichi Sasaki. 46-51 [doi]
- Evaluation of a Risk-Based Management Method for Online AccountsTakumi Akiyama, Kazuya Otani, Yoshio Kakizaki, Ryôichi Sasaki. 52-57 [doi]
- An Intrusion Detection System Based on NSGA-II AlgorithmAli Tamimi, D. Subbaram Naidu, Sanaz Kavianpour. 58-61 [doi]
- Malware Detection through Call System on Android Smartphone Using Vector Machine MethodVictor Wahanggara, Yudi Prayudi. 62-67 [doi]
- Real-Time Printed Document Authentication Using Watermarked QR CodeTeddy Mantoro, M. Iman Wahyudi, Media A. Ayu, Wendi Usino. 68-72 [doi]
- A Case Study of SQL Injection Vulnerabilities Assessment of .bd Domain Web ApplicationsDelwar Alam, Md. Alamgir Kabir, Touhid Bhuiyan, Tanjila Farah. 73-77 [doi]
- Hybrid Solution for Secured and Energy Aware Routing Path in Wireless Sensor NetworksAbdullah Said Alkalbani, Teddy Mantoro, Sardjoeni Moedjiono, Media A. Ayu. 78-83 [doi]
- From Risk Analysis to the Expression of Security Requirements for Systems InformationNabil Laoufi. 84-89 [doi]
- Portable Toolkit for Penetration Testing and Firewall ConfigurationHerny Ramadhani Mohd Husny Hamid, Megat Ahmad Izzat bin Megat Ahmad Kamil, Norhaiza Ya Abdullah. 90-94 [doi]
- Exploiting Ambient Light Sensor for Authentication on Wearable DevicesHyoseok Yoon, Se-Ho Park, Kyung-Taek Lee. 95-100 [doi]
- Packet Header Intrusion Detection with Binary Logistic Regression Approach in Detecting R2L and U2R AttacksMuhammad Hilmi Kamarudin, Carsten Maple, Tim Watson, Hasliza Sofian. 101-106 [doi]
- MLDED: Multi-layer Data Exfiltration Detection SystemMohammad Ahmad Abu Allawi, Ali Hadi, Arafat Awajan. 107-112 [doi]
- Estimating Posterior Probabilities to Identify Breach Points during Cyber-attacksSriram Raghavan, S. V. Raghavan. 113-116 [doi]
- Process Model of Digital Forensics Readiness Scheme (DFRS) as a Recommendation of Digital Evidence PreservationAhmad Luthfi, Yudi Prayudi. 117-122 [doi]
- Mobile Device Forensics: Extracting and Analysing Data from an Android-Based SmartphoneNormaziah Abdul Aziz, Fakhrulrazi Mokhti, M. Nadhar M. Nozri. 123-128 [doi]
- Similarity-Based Malware Classification Using Hidden Markov ModelMohammad Imran, Muhammad Tanvir Afzal, Muhammad Abdul Qadir. 129-134 [doi]
- Physical Authentication Using Random Number Generated (RNG) Keypad Based on One Time Pad (OTP) ConceptHerny Ramadhani Mohd Husny Hamid, Norhaiza Ya Abdullah. 135-139 [doi]
- Folder Lock by Using Multimodal Biometric: Fingerprint and Signature AuthenticationNorhaiza Ya Abdullah, Herny Ramadhani Mohd Husny Hamid. 140-145 [doi]
- Comparative Study of Cyber Security Policies among Malaysia, Australia, Indonesia: A Responsibility PerspectiveP. D. Persadha, A. A. Waskita, S. Yazid. 146-150 [doi]