Abstract is missing.
- Cyber-security analysis and evaluation for smart home management solutionsGiovanni Agosta, Alessio Antonini, Alessandro Barenghi, Dario Galeri, Gerardo Pelosi. 1-6 [doi]
- Browser fuzzing by scheduled mutation and generation of document object modelsYing-Dar Lin, Feng-Ze Liao, Shih-Kun Huang, Yuan-Cheng Lai. 1-6 [doi]
- Adaptive genetic controller for the dynamic optmization of network traffic of integrated security systemsFabio Garzia, Lorenzo Nesbitt, Roberto Cusani. 1-6 [doi]
- An end-to-end encrypted domain proximity recommendation system using secret sharing homomorphic cryptographyJyh-Ren Shieh. 1-6 [doi]
- An adaptive network intrusion detection approach for the cloud environmentHui-Hao Chou, Sheng-De Wang. 1-6 [doi]
- Virtual machines of high availability using hardware-assisted failure detectionWei-Jen Wang, Hung-Lin Huang, Shan-Hao Chuang, Shao-Jui Chen, Chia Hung Kao, Deron Liang. 1-6 [doi]
- Self-authentication watermark by digital halftoningChao-Ting Su, Hsi-Chun Wang. 1-6 [doi]
- Speaker identification experiments under gender De-identificationMarcos Faúndez-Zanuy, Enric Sesa-Nogueras, Stefano Marinozzi. 1-6 [doi]
- Computer network deception as a Moving Target DefenseVincent E. Urias, William M. S. Stout, Caleb Loverro. 1-6 [doi]
- A motion detection technique utilizing the size of encoded frameHayato Teduka. 1-6 [doi]
- A resistant digital image watermarking scheme based on masking modelDidi Rosiyadi, Shi-Jinn Horng, Nova Hadi Lestriandoko. 1-4 [doi]
- Comparative analysis of Governmental Countermeasures to cyber attacksLee Heon Soo. 1-6 [doi]
- Benefit of construct information security environment based on lightweight virtualization technologyJen-Chieh Wang, Wei-Fun Cheng, Han-Chiang Chen, Hung-Li Chien. 1-4 [doi]
- Information password recovery with GPUKun-Chi Lu, Angus F. M. Huang, Addison Y. S. Su, Ting-Jou Ding, Chiu-Nan Su. 1-5 [doi]
- An intelligent surveillance video analysis service in cloud environmentTse-Shih Chen, Ming-Fen Lin, Tzi-cker Chiueh, Cheng-Hsin Chang, Wei Heng Tai. 1-6 [doi]
- Techniques for the dynamic randomization of network attributesAdrian R. Chavez, William M. S. Stout, Sean Peisert. 1-6 [doi]
- Secure logging framework integrating with cloud databaseChung-Yi Lin, Ming-Che Chang, Hua-Chou Chiu, Keh-Hwa Shyu. 13-17 [doi]
- Comparative legislation, corporate policy, and citizen concerns: Legal solutions for privacy protection in cloud computingCharles Wharton, Kang-I. Lin. 19-24 [doi]
- A first exploratory study on the relevance of everyday object knowledge and training for increasing efficiency in airport security X-ray screeningNicole Hattenschwiler, Stefan Michel, Milena Kuhn, Sandrina Ritzmann, Adrian Schwaninger. 25-30 [doi]
- User acceptance of planar semiconductor fingerprint sensorsRamon Blanco-Gonzalo, Raul Sánchez-Reillo, Rodrigo Ros-Gomez, Belen Fernandez-Saavedra. 31-36 [doi]
- Data protection based on multifunction digital watermark in wireless sensor networkYongjun Ren, Yaping Cheng, Jin Wang, Liming Fang. 37-41 [doi]
- Novel method for early bearing fault detection based on dynamic stability measureMoisés Díaz Cabrera, Patricia Henríquez, Miguel A. Ferrer, Jesús B. Alonso, Giuseppe Pirlo, Donato Impedovo. 43-47 [doi]
- Providing online operational support for distributed, security sensitive electronic business processesMaurizio Talamo, Armanas Povilionis, Franco Arcieri, Christian H. Schunck. 49-54 [doi]
- A first simulation on optimizing EDS for cabin baggage screening regarding throughputYanik Sterchi, Adrian Schwaninger. 55-60 [doi]
- The causal model analysis of resident's evaluation of Closed Circuit TV and security perceptionHsiang-Te Liu, Yun-Ming Tang. 61-66 [doi]
- Latent dirichlet allocation based blog analysis for criminal intention detection systemSih-Huei Chen, Andri Santoso, Yuan-Shan Lee, Jia-Ching Wang. 73-76 [doi]
- Security considerations in ITRI cloud OSTzi-cker Chiueh, E. J. Chang, Robert Huang, Hogan Lee, Vernon Sung, M.-H. Chiang. 107-112 [doi]
- Reliable access control for multi-authority in cloud storageYongjun Ren, Zhenqi Yang, Jin Wang, Liming Fang. 113-116 [doi]
- A goal-driven approach to modeling security concerns in network management systemChia-Ling Wu. 123-129 [doi]
- Outsourced data tagging via authority and delegable auditing for cloud storageYongjun Ren, Jian Shen, Jin Wang, Liming Fang. 131-134 [doi]
- A study of android malware detection technology evolutionWan-Chen Hsieh, Chuan-Chi Wu, Yung-Wei Kao. 135-140 [doi]
- Implementation of SDN based network intrusion detection and prevention systemPin-Jui Chen, Yen-Wen Chen. 141-146 [doi]
- Distributed multistage alert correlation architecture based on HadoopJames Rees. 147-152 [doi]
- Cyber security risk assessment using an interpretable evolutionary fuzzy scoring systemChih-Hung Hsieh, Wei-Chieh Chao, Pei-Wen Liu, Chao-Wen Li. 153-158 [doi]
- An event-based SDN architecture for network security analysisPo-Ching Lin, Jyun-Chen Liu, Pin-Ren Chiou. 159-164 [doi]
- Security system and actual operation benefit of data transmission on heterogeneous networkChing-Wei Huang. 165-168 [doi]
- The design of battle field correlation tracksShaw-Shiun Deng, Hui-Zhen Gu, Chen-Wei Ku. 175-180 [doi]
- The computational rules extractor in the detection of tax evasionYi-Zeng Hsieh, Mu-Chun Su, Addison Y. S. Su, Wu-Rong Shih, Jen-Chih Yu, Chien-Yeh Huang. 181-184 [doi]
- A composite guidance for dual range AAM with side jet controlDer-ren Taur, Chung-Hsin Cheng. 185-189 [doi]
- Smartphone continuous authentication based on keystroke and gesture profilingJain-Shing Wu, Wan-Ching Lin, Chih-Ta Lin, Te-En Wei. 191-197 [doi]
- An audio secret sharing system based on fractal encodingJing-zhong Wang, Tian-Xi Wu, Tsung-Ying Sun. 211-216 [doi]
- A Digital Triage Forensics framework of Window malware forensic toolkit: Based on ISO/IEC 27037: 2012Da-Yu Kao, Guan-Jie Wu. 217-222 [doi]
- Score normalization for keystroke dynamics biometricsAythami Morales, Elena Luna-Garcia, Julian Fiérrez, Javier Ortega-Garcia. 223-228 [doi]
- Increasing the robustness of biometric templates for dynamic signature biometric systemsRubén Tolosana, Rubén Vera-Rodríguez, Javier Ortega-Garcia, Julian Fiérrez. 229-234 [doi]
- Movement based biometric authentication with smartphonesAntoniu L. Fantana, Selvakumar Ramachandran, Christian H. Schunck, Maurizio Talamo. 235-239 [doi]
- Improving face classification with multiple-clustering induced feature reductionNatthakan Iam-on, Tossapon Boongoen. 241-246 [doi]
- Emotion recognition from speech under environmental noise conditions using wavelet decompositionJuan Camilo Vásquez-Correa, N. Garcia, Juan Rafael Orozco-Arroyave, Julián David Arias-Londoño, Jesus Francisco Vargas Bonilla, Elmar Nöth. 247-252 [doi]
- Earprint recognition based on an ensemble of global and local featuresAythami Morales, Moisés Díaz Cabrera, Gloria Llinas-Sanchez, Miguel A. Ferrer. 253-258 [doi]
- The scrambling cryptography implemented with chaotic sequence trigger optical switch algorithm in WDM passive optical networkYao-Tang Chang, Yih-Chuan Lin. 259-262 [doi]
- The bilateral communication-based dynamic extensible honeypotChun-Yi Wang, Ya-Lyue Jhao, Chuan-Sheng Wang, Shih-Jen Chen, Fu-Hau Hsu, Yao-Hsin Chen. 263-268 [doi]
- Privacy-preserving proof of storage in large groupYongjun Ren, Jin Han, Jin Wang, Liming Fang. 269-272 [doi]
- Nuclear forensics and nuclear crime scene management problem in TaiwanCheng-Lung Lee, Chun-Chih Lin, Ming-Fong Tai, Chi-Chang Liu. 277-280 [doi]
- Atomizing apparatus for development of latent fingerprintsChih Julie Wang, Arvin Huang-Te Li, Ming-Chih Wang, Cheng-Lung Lee. 281-285 [doi]
- AD2: Anomaly detection on active directory log data for insider threat monitoringChih-Hung Hsieh, Chia-Min Lai, Ching-Hao Mao, Tien-Cheu Kao, Kuo-Chen Lee. 287-292 [doi]
- Scalable command and control detection in log data through UF-ICF analysisKai-Fung Hong, Chien-Chih Chen, Yu-Ting Chiu, Kuo-Sen Chou. 293-298 [doi]
- Efficient spear-phishing threat detection using hypervisor monitorChih-Hung Lin, Chin-Wei Tien, Chih-Wei Chen, Chia-Wei Tien, Hsing-Kuo Pao. 299-303 [doi]
- Lip-based visual speech recognition systemAufaclav Zatu Kusuma Frisky, Chien-Yao Wang, Andri Santoso, Jia-Ching Wang. 315-319 [doi]
- Testing of biometric systems integrated in mobile devicesBelen Fernandez-Saavedra, Raul Sánchez-Reillo, Carlos Sanchez-Redondo, Ramon Blanco-Gonzalo. 321-326 [doi]
- Discovering identity in intelligence data using weighted link based similarities: A case study of ThailandTossapon Boongoen, Natthakan Iam-on. 327-332 [doi]
- Making stronger identity for EU citizensJudith Liu-Jimenez, Raul Sánchez-Reillo, Ramon Blanco-Gonzalo, Belen Fernandez-Saavedra. 333-339 [doi]
- Off-line signature stability by optical flow: Feasibility study of predicting the verifier performanceMoisés Díaz Cabrera, Miguel A. Ferrer, Giuseppe Pirlo, Giuliano Giannico, Patricia Henríquez, Donato Impedovo. 341-345 [doi]
- Risk-based optimization design for checkpoints in airportsHuang Liang. 347-351 [doi]
- Research of liquid CT image de-noising based on improved NL-means algorithmHuang Liang. 359-362 [doi]
- Appling Lidar-based obstacle detection and wireless image transmission system for improving safety at level crossingsHo-Hsing Hsieh, Chi-Yao Hsu, Po-Yu Ke, Guang-Sheen Liu, Chih-Ping Lin. 363-367 [doi]
- An information sharing scheme in halftone images based on multi-scale error diffusionTzung-Fu Tsai, Po-Chyi Su. 369-372 [doi]
- Evaluation of strengths and weaknesses of dynamic handwritten signature recognition against forgeriesRaul Sánchez-Reillo, Helga C. Quiros-Sandoval, Judith Liu-Jimenez, Ines Goicoechea-Telleria. 373-378 [doi]
- A verification protocol of mobile payment based on signature recognitionHau-Ming Chang, Shu-Chiung Lin, Patrick S. Chen, Yu-Hsuan Hung. 379-384 [doi]
- The dynamic biometric signature - Is the biometric data in the created signature constant?Vladimir Smejkal, Ladislav Sieger, Jindrich Kodl, Daniel Novák, Jakub Schneider. 385-390 [doi]
- Personal re-identification using rank-based manifold rankingCheng-Ta Hsieh, Kuo-Chin Fan, Chin-Chuan Han. 391-394 [doi]
- Rapidly mutating Y-STRs population data in Taiwan and haplotype probability estimation for forensic purposesMeng-Yi Chen, Chang En Pu, Fang-Chin Wu, Huei-Yu Lai, Chin-Wen Ho. 395-402 [doi]
- Study on STR markers of DNA for improving the power of identification on cases in TaiwanFang-Chin Wu, Meng-Yi Chen, Chi-Hsiang Chao, Chang En Pu. 403-408 [doi]
- TACSA: A web-service based system for coastal surveillance and situational awarenessYi Ming Dai, Keh Shiou Liu. 409-413 [doi]
- From Safety to security - Pattern and anomaly detections in maritime trajectoriesShwu-Jing Chang, Kuan-Hung Yeh, Guan-Dun Peng, Shih-Ming Chang, Chung-Hao Huang. 415-419 [doi]
- Efficient detection algorithm for non-coherent high-resolution radar in sea clutterCristina Carmona-Duarte, Jaime Calvo-Gallego, Blas-Pablo Dorta-Naranjo, Miguel Angel Ferrer-Ballester. 421-426 [doi]
- Stochastic delineation of well capture zones in aquifers of Choushui River alluvial fan in central TaiwanChi-Ping Lin, Chuen-Fa Ni, I.-Hsian Li, Chih-Heng Lu. 427-432 [doi]