Abstract is missing.
- A Framework for Monitoring SIP Enterprise NetworksMohamed Nassar, Radu State, Olivier Festor. 1-8 [doi]
- Luth: Composing and Parallelizing Midpoint Inspection DevicesIon Alberdi, Vincent Nicomette, Philippe Owezarski. 9-16 [doi]
- Efficient Proof of Validity of Votes in Homomorphic E-VotingKun Peng, Feng Bao. 17-23 [doi]
- A Flexible and Efficient Alert Correlation Platform for Distributed IDSSebastian Roschke, Feng Cheng 0002, Christoph Meinel. 24-31 [doi]
- RF-DNA Fingerprinting for Airport WiMax Communications SecurityMcKay D. Williams, Sheldon A. Munns, Michael A. Temple, Michael J. Mendenhall. 32-39 [doi]
- Router and Link Admittance Control in the Optimized Link State Routing Protocol Version 2 (OLSRv2)Thomas Clausen, Ulrich Herberg. 40-46 [doi]
- Breaking Tor Anonymity with Game Theory and Data MiningCynthia Wagner, Gérard Wagener, Radu State, Thomas Engel, Alexandre Dulaunoy. 47-54 [doi]
- Dynamic Trust Model for Federated Identity ManagementHao Gao, Jun Yan, Yi Mu. 55-61 [doi]
- Securing Emergency Response Operations Using Distributed Trust DecisionsPeter Danner, Daniel M. Hein, Stefan Kraxberger. 62-69 [doi]
- A Novel Threat Assessment Method for DDoS Early Warning Using Network Vulnerability AnalysisQiang Liu, Jianping Yin, Zhiping Cai, Ming Zhu. 70-74 [doi]
- The Mobile Phone as a Multi OTP Device Using Trusted ComputingMohammed Al Zomai, Audun Jøsang. 75-82 [doi]
- A Software Watermarking Algorithm Based on Stack-State Transition GraphJinchao Xu, Guosun Zeng. 83-88 [doi]
- DIPLOMA: Distributed Policy Enforcement Architecture for MANETsMansoor Alicherry, Angelos D. Keromytis. 89-98 [doi]
- Towards Identify Anonymization in Large Survey Rating DataXiaoxun Sun, Hua Wang. 99-104 [doi]
- A View Based Access Control Model for SPARQLAlban Gabillon, Léo Letouzey. 105-112 [doi]
- Comparative Analysis of HTTP Anomaly Detection Algorithms: DFA vs N-GramsLi Lin, Christopher Leckie, Chenfeng Vincent Zhou. 113-119 [doi]
- Overcoming Reputation and Proof-of-Work Systems in BotnetsAndrew White, Alan Tickle, Andrew Clark. 120-127 [doi]
- Network Forensics in MANET: Traffic Analysis of Source Spoofed DoS AttacksYinghua Guo, Matthew Simon. 128-135 [doi]
- Efficient Ideal Threshold Secret Sharing Schemes Based on EXCLUSIVE-OR OperationsChunli Lv, Xiaoqi Jia, Lijun Tian, Jiwu Jing, Mingli Sun. 136-143 [doi]
- Analysis of Credential Stealing Attacks in an Open Networked EnvironmentAashish Sharma, Zbigniew Kalbarczyk, Ravishankar K. Iyer, James Barlow. 144-151 [doi]
- Security-Oriented Workflows for the Social SciencesRichard O. Sinnott, Sardar Hussain. 152-159 [doi]
- Monitoring Heavy-Hitter Flows in High-Speed Network ConcurrentlyFengyu Wang, Bin Gong, Shanqing Guo, Xiaofeng Wang. 160-166 [doi]
- Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing NetworkChaabane Abdelberi, Pere Manils, Mohamed Ali Kåafar. 167-174 [doi]
- Validating Denial of Service Vulnerabilities in Web ServicesSuriadi Suriadi, Andrew Clark, Desmond Schmidt. 175-182 [doi]
- Information-Theoretic Detection of Masquerade Mimicry AttacksJuan E. Tapiador, John A. Clark. 183-190 [doi]
- Computational Intelligence Utilisation in Simulation of Congestion Control in TCP/IP Edge NetworkReginald Lal, Andrew Chiou. 191-198 [doi]
- Business Process-Based Information Security Risk AssessmentKobra Khanmohammadi, Siv Hilde Houmb. 199-206 [doi]
- Risk-Aware Framework for Activating and Deactivating Policy-Based ResponseWael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus. 207-215 [doi]
- Fingerprint Reference Point Determination Based on Orientation FeaturesShan Juan Xie, Sook Yoon, Hui Gong, Jin Wook Shin, Dong-Sun Park. 216-222 [doi]
- Energy Friendly Integrity for Network Coding in Wireless Sensor NetworksAnya Apavatjrut, Wassim Znaidi, Antoine Fraboulet, Claire Goursaud, Cédric Lauradoux, Marine Minier. 223-230 [doi]
- Reasoning about Relation Based Access ControlAlessandro Artale, Bruno Crispo, Fausto Giunchiglia, Fatih Turkmen, Rui Zhang. 231-238 [doi]
- Trust-Involved Access Control in Collaborative Open Social NetworksHua Wang, Lili Sun. 239-246 [doi]
- CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash CrowdSheng Wen, Weijia Jia, Wei Zhou, Wanlei Zhou, Chuan Xu. 247-254 [doi]
- Agent-Based Trusted On-Demand Routing Protocol for Mobile Ad Hoc NetworksIslam Tharwat A. Halim, Hossam M. A. Fahmy, Ayman M. Bahaa El-Din, Mohamed H. El-Shafey. 255-262 [doi]
- Improving Fuzz Testing Using Game TheorySheila Becker, Humberto J. Abdelnur, Jorge Lucángeli Obes, Radu State, Olivier Festor. 263-268 [doi]
- HTTPSLock: Enforcing HTTPS in Unmodified Browsers with Cached JavascriptAdonis P. H. Fung, K.-W. Cheung. 269-274 [doi]
- A Node-based Trust Management Scheme for Mobile Ad-Hoc NetworksRaihana Ferdous, Vallipuram Muthukkumarasamy, Abdul Sattar. 275-280 [doi]
- Adaptive Clustering with Feature Ranking for DDoS Attacks DetectionLifang Zi, John Yearwood, Xin-Wen Wu. 281-286 [doi]
- An Efficient and High Scalable Key Distribution Scheme for Mobile Ad Hoc Network through Mining Traffic Meta-data PatternsAhmad Jabas, Wael Abdulal, S. Ramachandram. 287-292 [doi]
- Forensic Analysis of DoS Attack Traffic in MANETYinghua Guo, Ivan Lee. 293-298 [doi]
- Command Evaluation in Encrypted Remote SessionsRobert Koch, Gabi Dreo Rodosek. 299-305 [doi]
- Novel Multi-bit Bitwise Adaptive Embedding Algorithms with Minimum Error for Data HidingRong-Jian Chen, Yu-Cheng Peng, Jun-Jian Lin, Jui-Lin Lai, Shi-Jinn Horng. 306-311 [doi]
- Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders KnowledgebaseQussai Yaseen, Brajendra Panda. 312-317 [doi]
- An Improved Wavelet Analysis Method for Detecting DDoS AttacksLiang Fu Lu, Mao Lin Huang, Mehmet A. Orgun, Jiawan Zhang. 318-322 [doi]
- Ignorant Experts: Computer and Network Security Support from Internet Service ProvidersPatryk Szewczyk, Craig Valli. 323-327 [doi]
- The Design of Real-Time Adaptive Forensically Sound Secure Critical InfrastructureRay Hunt, Jill Slay. 328-333 [doi]
- A Three-Factor Authenticated Key Agreement Scheme for SIP on Elliptic CurvesEun-Jun Yoon, Kee-Young Yoo. 334-339 [doi]
- New Families of 2D & 3D Arrays for Sub-image WatermarkingOscar Moreno, Andrew Z. Tirkel, Ron G. van Schyndel, Parampalli Udaya. 340-344 [doi]
- A Novel Anonymization Technique to Trade Off Location Privacy and Data Integrity in Participatory Sensing SystemsM. Manzur Murshed, Tishna Sabrina, Anindya Iqbal, Kh Mahmudul Alam. 345-350 [doi]
- Automatic Generation of Assertions to Detect Potential Security Vulnerabilities in C Programs That Use Union and Pointer TypesShamsul Kamal Ahmad Khalid, Jacob Zimmermann, Diane Corney, Colin J. Fidge. 351-356 [doi]
- Global Detection of Flooding-Based DDoS Attacks Using a Cooperative Overlay NetworkThaneswaran Velauthapillai, Aaron Harwood, Shanika Karunasekera. 357-364 [doi]
- Identifying Legitimate Clients under Distributed Denial-of-Service AttacksSteven Simpson, Adam T. Lindsay, David Hutchison. 365-370 [doi]
- A Dynamic Mutual RFID Authentication Model Preventing Unauthorized Third Party AccessMatthieu-P. Schapranow, Alexander Zeier, Hasso Plattner. 371-376 [doi]
- Getting the Real-Time Precise Round-Trip Time for Stepping Stone DetectionPing Li, Wanlei Zhou, Yini Wang. 377-382 [doi]
- Cluster Based Rule Discovery Model for Enhancement of Government s Tobacco Control StrategyMd. Shamsul Huda, John Yearwood, Ron Borland. 383-390 [doi]
- Specifying Usage Control Model with Object Constraint LanguageMin Li, Hua Wang. 391-397 [doi]
- A Query Processing Strategy for Conceptual Queries Based on Object-Role ModelingAntónio Rosado, João M. P. Cardoso. 398-403 [doi]
- The Enablers and Implementation Model for Mobile KMS in Australian HealthcareHeng-Sheng Tsai, Raj Gururajan. 404-411 [doi]
- A Smoothing Evolutionary Algorithm with Circle Search for Global OptimizationYuping Wang, Lei Fan. 412-418 [doi]
- The PU-Tree: A Partition-Based Uncertain High-Dimensional Indexing AlgorithmYi Zhuang. 419-424 [doi]
- An Improved PageRank Algorithm: Immune to SpamBing-Yuan Pu, Ting-Zhu Huang, Chun Wen. 425-429 [doi]
- The Convergences of Multisplitting Parallel Methods for Non-Hermitian Positive Definite SystemsChuan-Long Wang, Yan-Ping Wang. 430-434 [doi]
- Systematic Clustering-Based Microaggregation for Statistical Disclosure ControlMd. Enamul Kabir, Hua Wang. 435-441 [doi]
- Hybrid Wrapper-Filter Approaches for Input Feature Selection Using Maximum Relevance and Artificial Neural Network Input Gain Measurement Approximation (ANNIGMA)Md. Shamsul Huda, John Yearwood, Andrew Stranieri. 442-449 [doi]
- Credit Spread Option Pricing by Dynamic CopulasPing Li, Guangdong Huang. 450-455 [doi]
- An Approach to Specify Knowledge in Multi-agent Systems Using Petri NetsEder Mateus Nunes Gonçalves. 456-461 [doi]
- Exploratory Study to Explore the Role of ICT in the Process of Knowledge Management in an Indian Business EnvironmentAbdul Hafeez-Baig, Raj Gururajan, Heng Sheng Tasi, Prema Sankaran. 462-469 [doi]
- Resource Selection from Distributed Semantic Web StoresAhmad Ali Iqbal, Maximilian Ott, Aruna Seneviratne. 470-476 [doi]
- Spatio-temporal Knowledge Discovery in Very Large METOC Data SetsD. Marks, Elias Ioup, John Sample, Mahdi Abdelguerfi, Fady Qaddoura. 477-480 [doi]
- Privacy-Preserving Protocols for String MatchingYonglong Luo, Lei Shi, Caiyun Zhang, Ji Zhang. 481-485 [doi]
- A Purpose Based Access Control in XML Databases SystemLili Sun, Hua Wang, Raj Jururajin, Sri Sriprakash. 486-493 [doi]
- An Efficient and Effective Duplication Detection Method in Large Database ApplicationsJi Zhang. 494-501 [doi]
- Fast IPTV Channel Switching Using Hot-View and Personalized Channel Preload over IEEE 802.16eChih-Lun Chou, Gwo-Jiun Horng, Sheng-Tzong Cheng. 502-507 [doi]
- A Pivot-Based Distributed Pseudo Facial Image Retrieval in Manifold Spaces: An Efficiency StudyYi Zhuang. 508-514 [doi]
- OntoPsic: Leveraging the Knowledge in the Treatment and Diagnosis of TelepsychiatryFabrício da Costa Dias, Ryan Ribeiro de Azevedo, Cleyton Mário de Oliveira Rodrigues, Eric Rommel Dantas Galvão, Guilherme Ataíde Dias, Roberto Souto Maior de Barros. 515-520 [doi]
- Five Criteria for Web-Services Security ArchitectureRonald G. Addie, Alan W. Colman. 521-526 [doi]
- A Two-Step Mutual Authentication Protocol Based on Randomized Hash-Lock for Small RFID NetworksKaleb Lee. 527-533 [doi]
- vESP: A Video-Enabled Enterprise Search PlatformPål Halvorsen, Dag Johansen, Bjørn Olstad, Tomas Kupka, Sverre Tennøe. 534-541 [doi]
- Certificateless Proxy Signature and Its Extension to Blind SignatureRaylin Tso, Xun Yi. 542-547 [doi]
- A Novel Approach to Dynamic ID-Based Remote User Authentication Scheme for Multi-server EnvironmentMin-Hua Shao, Ying-Chih Chin. 548-553 [doi]
- On the Security of Identity Based Threshold Unsigncryption SchemesS. Sharmila Deva Selvi, S. Sree Vivek, Chandrasekaran Pandu Rangan, S. Priti. 554-559 [doi]
- A Rights Management Approach to Securing Data Distribution in CoalitionsFarzad Salim, Nicholas Paul Sheppard, Reihaneh Safavi-Naini. 560-567 [doi]
- Identity Based Self Delegated Signature - Self Proxy SignaturesS. Sharmila Deva Selvi, S. Sree Vivek, S. Gopi Nath, C. Pandu Rangan. 568-573 [doi]
- Security Analysis of Yang et al. s Practical Password-Based Two-Server Authentication and Key Exchange SystemXun Yi. 574-578 [doi]
- Face Gender Recognition Based on 2D Principal Component Analysis and Support Vector MachineLen Bui, Dat Tran, Xu Huang, Girija Chetty. 579-582 [doi]
- Password Entropy and Password QualityWanli Ma, John Campbell, Dat Tran, Dale Kleeman. 583-587 [doi]
- Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key ExchangeXu Huang, Pritam Gajkumar Shah, Dharmendra Sharma. 588-593 [doi]
- Secure Communication in 802.11 Networks with a Novel Protocol Using Quantum CryptographyXu Huang, Shirantha Wijesekera, Dharmendra Sharma. 594-599 [doi]
- Scalar Multiplication of a Dynamic Window with Fuzzy Controller for Elliptic Curve CryptographyXu Huang, John Campbell, Frank Gao. 600-605 [doi]
- Digital Video Tamper Detection Based on Multimodal Fusion of Residue FeaturesGirija Chetty, Monica Biswas, Rashmi Singh. 606-613 [doi]