Abstract is missing.
- Processing Social Media Data for Crisis Management in AthenaBabak Akhgar, Helen Gibson. 3-14 [doi]
- Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence?Petra Saskia Bayerl, Babak Akhgar. 15-20 [doi]
- Improving Cyber Situational Awareness Through Data Mining and Predictive Analytic TechniquesSina Pournouri, Babak Akhgar. 21-34 [doi]
- Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and RisksReza Alavi, Shareeful Islam, Haris Mouratidis. 50-56 [doi]
- A Consideration of eDiscovery Technologies for Internal InvestigationsAmie Taal, Jenny Le, James A. Sherer. 59-73 [doi]
- Cloud Forensics Challenges Faced by Forensic InvestigatorsWakas Mahmood, Hamid Jahankhani, Aykut Ozkaya. 74-82 [doi]
- Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime InvestigationsReza Montasari, Pekka Peltola, David Evans. 83-95 [doi]
- Computer Forensic Analysis of Private Browsing ModesReza Montasari, Pekka Peltola. 96-109 [doi]
- Searching the Web for Illegal Content: The Anatomy of a Semantic Search EngineLuigi Laura, Gianluigi Me. 113-122 [doi]
- The Enemy Within: The Challenge for Business from Cyber-attackMichael Reynolds. 123-136 [doi]
- Understanding Privacy Concerns in Online Courses: A Case Study of ProctortrackAnwar-ul-Haq, Arshad Jamal, Usman Butt, Asim Majeed, Aykut Ozkaya. 137-150 [doi]
- Towards a Common Security and Privacy Requirements Elicitation MethodologyEleni-Laskarina Makri, Costas Lambrinoudakis. 151-159 [doi]
- Automated Security Testing Framework for Detecting SQL Injection Vulnerability in Web ApplicationNor Fatimah Awang, Azizah Abd Manaf. 160-171 [doi]
- A Survey on Financial Botnets ThreatGiovanni Bottazzi, Gianluigi Me. 172-181 [doi]
- Wavelet Based Image Enlargement TechniqueAkbar Sheikh Akbari, Pooneh Bagheri Zadeh. 182-188 [doi]
- Understanding Android SecurityGregor Robinson, George R. S. Weir. 189-199 [doi]
- Gender Impact on Information Security in the Arab WorldFathiya Al Izki, George R. S. Weir. 200-207 [doi]
- Some Security Perils of Smart Living - (A Day in the Life of John Q Smith, a Citizen of Utopia, and His Twin Brother, Who Isn't)David Lilburn Watson. 211-227 [doi]
- An Analysis of Honeypot Programs and the Attack Data CollectedChris Moore, Ameer Al-Nemrat. 228-238 [doi]
- An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication AlgorithmsHenrique M. Dinis Santos, Sérgio Tenreiro de Magalhães, Maria José Magalhães. 239-243 [doi]
- Security and Feasibility of Power Line Communication SystemAli Hosseinpour, Amin Hosseinian Far, Hamid Jahankhani, Alireza Ghadrdanizadi. 244-251 [doi]
- A Comparison Study for Different Wireless Sensor Network ProtocolsFaris Al-Baadani, Sufian Yousef. 252-259 [doi]
- Responsive Cyber-Physical Risk Management (RECYPHR) - A Systems FrameworkAli G. Hessami, Hamid Jahankhani, Mathews Z. Nkhoma. 263-274 [doi]
- Risk and Privacy Issues of Digital Oil Fields in the CloudHamid Jahankhani, Najib Altawell, Ali G. Hessami. 275-284 [doi]
- Simulation of Cloud Data Security Processes and PerformanceKrishan Chand, Muthu Ramachandran, Ah Lian Kor. 285-295 [doi]
- A Framework for Cloud Security AuditUmar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis. 296-309 [doi]
- Software Security Requirements Engineering: State of the ArtMuthu Ramachandran. 313-322 [doi]
- Conflicts Between Security and Privacy Measures in Software Requirements EngineeringDaniel Ganji, Haralambos Mouratidis, Saeed Malekshahi Gheytassi, Miltos Petridis. 323-334 [doi]
- Securing the Blind User Visualization and Interaction in Touch ScreenMohammed Fakrudeen, Sufian Yousef. 335-347 [doi]
- Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the EyewriterBobby L. Tait. 348-359 [doi]