Abstract is missing.
- Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific FoundationGeorge Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu 0005. 1-8 [doi]
- SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via OffloadingVictor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar. 9-29 [doi]
- Inference-Proof Data Publishing by Minimally Weakening a Database InstanceJoachim Biskup, Marcel Preuß. 30-49 [doi]
- Extending Dolev-Yao with AssertionsRamaswamy Ramanujam, Vaishnavi Sundararajan, S. P. Suresh. 50-68 [doi]
- Inferring Accountability from Trust PerceptionsKoen Decroix, Denis Butin, Joachim Jansen, Vincent Naessens. 69-88 [doi]
- Client Side Web Session Integrity as a Non-interference PropertyWilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef, Frank Piessens. 89-108 [doi]
- Impact of Multiple t-t SMER Constraints on Minimum User Requirement in RBACArindam Roy, Shamik Sural, Arun Kumar Majumdar. 109-128 [doi]
- Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative PoliciesSadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. 129-148 [doi]
- A Formal Methodology for Modeling Threats to Enterprise AssetsJaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar. 149-166 [doi]
- A Novel Approach for Searchable CP-ABE with Hidden Ciphertext-PolicyMukti Padhya, Devesh Jinwala. 167-184 [doi]
- Towards a More Democratic Mining in BitcoinsGoutam Paul, Pratik Sarkar, Sarbajit Mukherjee. 185-203 [doi]
- Authentication Schemes - Comparison and Effective Password SpacesPeter Mayer, Melanie Volkamer, Michaela Kauer. 204-225 [doi]
- A Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to the EPSHiten Choudhury, Basav Roychoudhury, Dilip K. Saikia. 226-244 [doi]
- A Usage-Pattern Perspective for Privacy Ranking of Android AppsXiaolei Li, Xinshu Dong, Zhenkai Liang. 245-256 [doi]
- Privacy Leakage Attacks in Browsers by Colluding ExtensionsAnil Saini, Manoj Singh Gaur, Vijay Laxmi, Tushar Singhal, Mauro Conti. 257-276 [doi]
- CORP: A Browser Policy to Mitigate Web Infiltration AttacksKrishna Chaitanya Telikicherla, Venkatesh Choppella, Bruhadeshwar Bezawada. 277-297 [doi]
- An Improved Methodology towards Providing Immunity against Weak Shoulder Surfing AttackNilesh Chakraborty, Samrat Mondal. 298-317 [doi]
- Catching Classical and Hijack-Based Phishing AttacksTanmay Thakur, Rakesh Verma. 318-337 [doi]
- PMDS: Permission-Based Malware Detection SystemPaolo Rovelli, Ymir Vigfusson. 338-357 [doi]
- Efficient Detection of Multi-step Cross-Site Scripting VulnerabilitiesAlexandre Vernotte, Frédéric Dadeau, Franck Lebeau, Bruno Legeard, Fabien Peureux, François Piat. 358-377 [doi]
- CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic EnforcementRichard Gay, Jinwei Hu, Heiko Mantel. 378-398 [doi]
- Automatic Generation of Compact Alphanumeric Shellcodes for x86Aditya Basu, Anish Mathuria, Nagendra Chowdary. 399-410 [doi]
- Analysis of Fluorescent Paper Pulps for Detecting Counterfeit Indian Paper MoneyBiswajit Halder, Rajkumar Darbar, Utpal Garain, Abhoy Ch. Mondal. 411-424 [doi]
- A Vein Biometric Based Authentication SystemPuneet Gupta, Phalguni Gupta. 425-436 [doi]
- Digital Forensic Technique for Double Compression Based JPEG Image Forgery DetectionPankaj Malviya, Ruchira Naskar. 437-447 [doi]
- Preserving Privacy in Location-Based Services Using Sudoku StructuresSumitra Biswal, Goutam Paul, Shashwat Raizada. 448-463 [doi]
- Location Obfuscation Framework for Training-Free Localization SystemThong M. Doan, Han N. Dinh, Nam T. Nguyen, Phuoc T. Tran. 464-476 [doi]