Abstract is missing.
- Graphical passwords for older computer usersNancy Carter, Cheng Li, Qun Li, Jennifer A. Stevens, Ed Novak, Zhengrui Qin, Jiquo Yu. [doi]
- Understanding the effectiveness of typosquatting techniquesJeffrey Spaulding, DaeHun Nyang, Aziz Mohaisen. [doi]
- NoCDN: scalable content delivery without a middlemanJunbo Xu, Michael Rabinovich. [doi]
- Automated least privileges in cloud-based web servicesMatthew Sanders, Chuan Yue. [doi]
- Extracting web information using representation patternsJuan C. Roldán, Patricia Jiménez, Rafael Corchuelo. [doi]
- Precog: action-based time-shifted prefetching for web applications on mobile devicesShruti Sanadhya, Uma Parthavi Moravapalle, Kyu-Han Kim, Raghupathy Sivakumar. [doi]
- Rethinking information sharing for threat intelligenceAziz Mohaisen, Omar Al-Ibrahim, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla. [doi]
- A knowledge and reasoning toolkit for cognitive applicationsMustafa Canim, Cristina Cornelio, Robert Farrell, Achille Fokoue, Kyle Gao, John Gunnels, Arun Iyengar, Ryan Musa, Mariano Rodriguez-Muro, Rosario Uceda-Sosa. [doi]
- Inference attacks based on neural networks in social networksBo Mei, Yinhao Xiao, Hong Li, Xiuzhen Cheng, Yunchuan Sun. [doi]
- Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketchesShir Landau Feibish, Yehuda Afek, Anat Bremler-Barr, Edith Cohen, Michal Shagam. [doi]
- An empirical study of financial incentivized question answering in social websitesHuangxin Wang, Zhonghua Xi, Jean X. Zhang, Fei Li 0001. [doi]
- Graph-pubsub: an efficient pub/sub architecture with graph-based information relationshipJiachen Chen, Haoyuan Xu, Yanyong Zhang, Dipankar Raychaudhuri. [doi]
- Edge computing enabled smart firefighting: opportunities and challengesXiaopei Wu, Robert Dunne, Qingyang Zhang, Weisong Shi. [doi]
- Enabling distributed revision control systems in delay-tolerant networksPhilipp Hagemeister, Martin Mauve. [doi]