Abstract is missing.
- Comparing Brazilian Platforms for Monitoring Roads, Designed to Support Law EnforcementLindemberg Naffah Ferreira. 1-5 [doi]
- Microwave Quantum Radar: An Experimental ValidationDavid Luong, Bhashyam Balaji, Chung Wai Sandbo Chang, Vadiraj Manjunath, Ananthapadmanabha Rao, Christopher Wilson. 1-5 [doi]
- User-Centered Differential Privacy Mechanisms for Electronic Medical RecordsOmar Gutierrez, Jeffreys J. Saavedra, Mayra Zurbarán, Augusto Salazar, Pedro M. Wightman. 1-5 [doi]
- Email-based Password Recovery - Risking or Rescuing Users?Fatma Al Maqbali, Chris J. Mitchell. 1-5 [doi]
- Human Factors in SecurityAnn E. Speed, Bryana L. Woo, Camron G. Kouhestani, Jaclynn J. Stubbs, Gabriel C. Birch. 1-5 [doi]
- An Empirical Study of SSL Usage in Android AppsDongwan Shin, Jiangfeng Sun. 1-5 [doi]
- Attacking a Smartphone Biometric Fingerprint System: A Novice's ApproachRamon Blanco-Gonzalo, Barbara Corsetti, Ines Goicoechea-Telleria, A. Husseis, Judith Liu-Jimenez, Raul Sánchez-Reillo, Teodors Eglitis, Elakkiya Ellavarason, R. M. Guest, Chiara Lunerti, M. Azimi, J. Khiarak, Salatiel Ezennaya-Gomez, N. Whiskerd, R. Kuzu, E. Okoh. 1-5 [doi]
- Leveraging a LiveNirtual/Constructive Testbed for the Evaluation of Moving Target DefensesWilliam M. S. Stout, Brian P. Van Leeuwen, Vincent E. Urias, Julian Tuminaro, Spencer Schrock, Nomaan Dossaji. 1-5 [doi]
- Security Personnel of New GenerationKrystyna Ljubymenko, Milan Adamek. 1-4 [doi]
- PSA-LOPA - A Novel Method for Physical Security Risk Analysis based on Layers of Protection AnalysisFabio Garzia, Mara Lombardi, Mario Fargnoli, Soodamani Ramalingam. 1-5 [doi]
- Why Ransomware Needs A Human TouchAna Ferreira. 1-5 [doi]
- Threats Analysis and Security Analysis for Critical Infrastructures: Risk Analysis Vs. Game TheoryPierpaolo Napolitano, Giuliano Rossi, Mara Lombardi, Fabio Garzia, Massimo Ilariucci, Giuseppe Forino. 1-5 [doi]
- The use of Expert Judgement as the Method to Obtain Delay Time Values of Passive Barriers in the Context of the Physical Protection SystemAnton Siser, Ladislav Maris, David Rehak, Witalis Pellowski. 1-5 [doi]
- A Biometric Attack Case Based on Signature SynthesisMiguel A. Ferrer, Moisés Díaz, Cristina Carmona-Duarte, Rejean Plamondon. 1-6 [doi]
- Web Deception Towards Moving Target DefenseBasirudin Djamaluddin, Ahmed Alnazeer, Farag Azzedin. 1-5 [doi]
- Airport Security X-Ray Screening of Hold Baggage: 2D Versus 3D Imaging and Evaluation of an on-Screen Alarm Resolution ProtocolNicole Hattenschwiler, Sarah Merks, Adrian Schwaninger. 1-5 [doi]
- Physical Security Assessment Using Temporal Machine LearningMeghan A. Galiardi, Stephen J. Verz, Gabriel C. Birch, Jaclynn J. Stubbs, Bryana L. Woo, Camron G. Kouhestani. 1-5 [doi]
- Identity Management, Access Control and Privacy in Integrated Care Platforms: The PICASO ProjectArmanas Povilionis, Franco Arcieri, Maurizio Talamo, Indiraiith Viji Ananth, Christian H. Schunck, Peter Rosengren, Jesper Thestrup, Jutta G. Richter, Agostino Chiaravalottik, Orazio Schillaci, Henrike Gappa, Carlos A. Velasco. 1-5 [doi]
- About the Abuse Options of the Dynamic Biometric SignatureVladimir Smejkal, Jindrich Kodl, Frantisek Hortai, Petr Tesar. 1-6 [doi]
- AirSign: A Gesture-Based Smartwatch User AuthenticationAttaullah Buriro, Rutger Van Acker, Bruno Crispo, Athar Mahboob. 1-5 [doi]
- Analyzing the Vulnerability of Wireless Sensor Networks to a Malicious Matched Protocol AttackGeorge D. O'Mahony, Philip J. Harris, Colin C. Murphy. 1-5 [doi]
- Trust Management in Underwater Acoustic MANETs based on Cloud Theory using Multi-Parameter MetricsM. Phil Lowney, Hong Liu, Eugene Chabot. 1-5 [doi]
- X-ray Screening of Hold Baggage: Are the Same Visual-Cognitive Abilities Needed for 2D and 3D Imaging?Sarah Merks, Nicole Hattenschwiler, Melina Zeballos, Adrian Schwaninger. 1-5 [doi]
- MIMO Cable Guided RadarC. M. Keith Harman. 1-5 [doi]
- Perceived Risk Assessment through Open-Source Intelligent Techniques for Opinion Mining and Sentiment Analysis: The Case Study of the Papal Basilica and Sacred Convent of Saint Francis in Assisi, ItalyFabio Garzia, Roberto Cusani, Francesco Borghini, Benedetta Saltini, Mara Lombardi, Soodamani Ramalingam. 1-5 [doi]
- Examining Threat Image Projection Artifacts and Related Issues: A Rating StudyRobin Riz a Porta, Yanik Sterchi, Adrian Schwaninger. 1-4 [doi]
- Radar Error Calculation and Correction System Based on ADS-B and Business Intelligent ToolsJimmy Anderson Florez Zuluaga, Jesus Francisco Vargas Bonilla, Jose David Ortega Pabon, Carlos Mario Suarez Rios. 1-5 [doi]
- rev.ng: A Multi-Architecture Framework for Reverse Engineering and Vulnerability DiscoveryAlessandro Di Federico, Pietro Fezzardi, Giovanni Agosta. 1-5 [doi]
- Effects of Data Reduction when using Gaussian Mixture Models in Unidimensional Biometric SignalsPaloma Tirado-Martin, Raul Sánchez-Reillo, Jongwon Park. 1-5 [doi]
- Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and ClassificationArash Habibi Lashkari, Andi Fitriah Abdul Kadir, Laya Taheri, Ali A. Ghorbani. 1-7 [doi]
- Quantum Radar: Snake Oil or Good Idea?Bhashyam Balaji. 1-7 [doi]
- An Ear Anti-Spoofing Database with Various AttacksJalil Nourmohammadi-Khiarak, Andrzej Pacut. 1-5 [doi]
- Sensing Movement on Smartphone Devices to Assess User Interaction for Face VerificationChiara Lunerti, Richard M. Guest, Jon Baker, Pablo Fernández López, Raul Sánchez-Reillo. 1-5 [doi]
- Reliable Leak Detection in Pipelines Using Integrated DdTS Temperature and DAS Acoustic Fiber-Optic SensorChaofan Wang, Michael Olson, Benjamin Sherman, Nyambuu Dorjkhand, Joseph Mehr, Shailesh Singh. 1-5 [doi]
- Facial Expression Recognition using Transfer LearningSoodamani Ramalingam, Fabio Garzia. 1-5 [doi]
- The Next Generation of Robust Linux Memory Acquisition Technique via Sequential Memory Dumps at Designated Time IntervalsSaeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani. 1-6 [doi]
- Influence of Walking Speed and Smartphone Position on Gait RecognitionPablo Fernández López, Kiyoshi Kiyokawa, Yang Wu, Judith Liu-Jimenez. 1-5 [doi]
- Translating GDPR into the mHealth PracticeJoana Muchagata, Ana Ferreira. 1-5 [doi]
- Toward a Multi-Agent System Architecture for Insight & Cybersecurity in Cyber-Physical NetworksWilliam M. S. Stout. 1-5 [doi]
- Speaker Verification System for Online Education PlatformsNicanor García-Ospina, Juan Rafael Orozco-Arroyave, Jesus Francisco Vargas Bonilla. 1-5 [doi]
- Cyber Range Infrastructure Limitations and Needs of Tomorrow: A Position PaperVincent E. Urias, William M. S. Stout, Brian P. Van Leeuwen, Han Lin. 1-5 [doi]
- Presentation Attack Detection Evaluation on Mobile Devices: Simplest Approach for Capturing and Lifting a Latent FingerprintInes Goicoechea-Telleria, Ana Garcia-Peral, Anas Husseis, Raul Sánchez-Reillo. 1-5 [doi]
- US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity EcosystemRima Rana, Razieh Nokhbeh Zaeem, K. Suzanne Barber. 1-5 [doi]
- Adversarial Examples Detection Using No-Reference Image Quality FeaturesZahid Akhtar, João Monteiro, Tiago H. Falk. 1-5 [doi]
- Quantum Illumination: A Laboratory InvestigationBhashyam Balaji, Duncan England. 1-4 [doi]
- Applying a Threat Model to Cloud ComputingVincent E. Urias, Brian P. Van Leeuwen, William M. S. Stout, Han Lin. 1-5 [doi]
- Maximizing and Leveraging Behavioral Discrepancies in TLS Implementations using Response-Guided Differential FuzzingAndreas Walz, Axel Sikora. 1-5 [doi]
- Enhanced Buried Perimeter Protection using A Fiber-Optic Target Classification SensorChaofan Wang, Michael Olson, Benjamin Sherman, Nyambuu Dorjkhand, Joseph Mehr, Shailesh Singh. 1-5 [doi]
- Counter Unmanned Aerial System Security EducationJaclynn J. Stubbs, Camron G. Kouhestani, Bryana L. Woo, Gabriel C. Birch. 1-5 [doi]
- Performing a Presentation Attack Detection on Voice BiometricsJorge Sanchez-Casanova, Ines Goicoechea-Telleria, Judith Liu-Jimenez, Raul Sánchez-Reillo. 1-5 [doi]
- Airport Staff Access Control: Biometrics at Last?Christer J. Wilkinson. 1-8 [doi]
- TagUBig - Taming Your Big DataAna Ferreira, Joana Muchagata. 1-5 [doi]