Abstract is missing.
- A novel implementation of parallel homomorphic encryption for secure data storage in cloudKamalakanta Sethi, Amartya Majumdar, Padmalochan Bera. 1-7 [doi]
- An empirical performance and security evaluation of android container solutionsTianhui Meng, Zhihao Shang, Katinka Wolter. 1-8 [doi]
- Continuous implicit authentication for mobile devices based on adaptive neuro-fuzzy inference systemFeng Yao, Suleiman Y. Yerima, Boojoong Kang, Sakir Sezer. 1-7 [doi]
- Investigation of cyber crime conducted by abusing weak or default passwords with a medium interaction honeypotDaniel Fraunholz, Daniel Krohmer, Simon Duque Antón, Hans Dieter Schotten. 1-7 [doi]
- Foiling cyber attacksClement Guitton. 1-7 [doi]
- Identifying email threats using predictive analysisYuanyuan Grace Zeng. 1-2 [doi]
- Securing an US$ 2.8B digital asset: The movie - AvatarStephen Singam. 1-3 [doi]
- UAE cybercrime law and cybercrimes - An analysisAmala V. Rajan, Rejitha Ravikumar, Mariam Al Shaer. 1-6 [doi]
- Malware detection in android based on dynamic analysisTaniya Bhatia, Rishabh Kaushal. 1-6 [doi]
- Security operations centre: Situation awareness, threat intelligence and cybercrimeCyril Onwubiko. 1-6 [doi]
- PrincessLocker analysisYassine Lemmou, El Mamoun Souidi. 1-10 [doi]
- ROPK++: An enhanced ROP attack detection framework for Linux operating systemVahid Moula, Salman Niksefat. 1-6 [doi]
- Improving dynamic analysis of android apps using hybrid test input generationMohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer. 1-8 [doi]
- When eHealth meets the internet of things: Pervasive security and privacy challengesMichelle Omoogun, Preetila Seeam, Visham Ramsurrun, Xavier J. A. Bellekens, Amar Seeam. 1-7 [doi]
- Improved software vulnerability patching techniques using CVSS and game theoryLouai Maghrabi, Eckhard Pfluegel, Luluwah Al-Fagih, Roman Graf, Giuseppe Settanni, Florian Skopik. 1-6 [doi]