Abstract is missing.
- An Computer Virus Spreading Model with Delayed Quarantine in InternetQiming Liu, Changsong Deng. 1-5 [doi]
- An Effective Usage and Access Control Scheme for Preventing Permission Leak in a Trusted Execution EnvironmentRui Chang, Liehui Jiang, Qing Yin, Lu Ren, Qingfeng Liu. 6-10 [doi]
- Dynamic Ordering of Firewall Rules Using a Novel Swapping Window-based ParadigmRatish Mohan, Anis Yazidi, Boning Feng, B. John Oommen. 11-20 [doi]
- A Dynamic Access Control Model for Cloud Computing EnvironmentsBelbergui Chaimaa, Elkamoun Najib, Rachid Hilal. 21-29 [doi]
- Comparison of Security Frameworks for Governmental Clouds between United States and European UnionZhilong Wang, Tao Zhang, Yu Yang, Haipeng Qu. 30-34 [doi]
- An Effective Model for Anonymizing Personal Location TrajectoryA. S. M. Touhidul Hasan, Qingshan Jiang, Chengming Li, Lifei Chen. 35-39 [doi]
- Channel Estimation Algorithm based on Distance Judgement and Remainder Compensation in OFDM SystemXiangjun Ma, Lei Huang, Ye Lu, Chuanqi Li. 40-45 [doi]
- Design and Implementation of Automatic Vehicle Tracker System for Accidental EmergencyBhupesh B. Lonkar, Manoj R. Sayankar. 46-50 [doi]
- Eliminating Route Modifiers by Pattern Synthesis Process in Wireless Sensor NetworksC. N. Vanitha, M. Usha. 51-55 [doi]
- E-Commerce Websites/blogs - Hassles and PredicamentsHarsha Mittemari Rajesh, Insu Song. 56-61 [doi]
- A Safeguard against Fast Self-propagating MalwareMuhammad Aminu Ahmad, Steve Woodhead, Diane Gan. 65-69 [doi]
- A Novel Approach to Evade Attacks in Online Social NetworksAmardeep Singh, Divya Bansal, Sanjeev Sofat. 70-74 [doi]
- A Novel Technique to Characterize Social Network Users: Comparative StudyMonika Singh 0001, Divya Bansal, Sanjeev Sofat. 75-79 [doi]
- Modbus Communication Behavior Modeling and SVM Intrusion Detection MethodWenli Shang, Junrong Cui, Ming Wan, Panfeng An, Peng Zeng 0001. 80-85 [doi]
- Detecting Fake Sites based on HTML Structure AnalysisJia-Chang Xu, Kilho Shin, Yu-Lu Liu 0001. 86-90 [doi]
- Fully Secure Hidden Ciphertext Policy Attribute-Based Encryption with Short Ciphertext SizeCancan Jin, Xinyu Feng 0002, Qingni Shen. 91-98 [doi]
- An Anomaly-based Intrusion Detection Architecture Integrated on OpenFlow SwitchNguyen Thanh Van, Bao Ho, Tran Ngoc Thinh. 99-103 [doi]
- PPEP: A Deployable Privacy Preserving E-Commerce Protocol for Electronic GoodsMoses Ike, Kamil SaraƧ. 104-112 [doi]
- Improving NORMALS Using Modified Baudot-Murray CodeAndreyadi Wibowo, Ari Moesriami Barmawi. 113-118 [doi]
- An Efficient and Secure Authentication Scheme With User Anonymity for Roaming Service in Global Mobile NetworksR. Madhusudhan, Shashidhara. 119-126 [doi]