Abstract is missing.
- Cloud-Centric Assured Information SharingBhavani M. Thuraisingham, Vaibhav Khadilkar, Jyothsna Rachapalli, Tyrone Cadenhead, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Mohammad Farhan Husain. 1-26 [doi]
- Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian RegionZahri Yunos, Rabiah Ahmad, Syahrir Mat Ali, Solahuddin Shamsuddin. 27-35 [doi]
- CybercrimeIR - A Technological Perspective to Fight CybercrimeWeiping Chang, Yungchang Ku, Sinru Wu, Chaochang Chiu. 36-44 [doi]
- Information Credibility on Twitter in Emergency SituationXin Xia, Xiaohu Yang, Chao Wu, Shanping Li, Linfeng Bao. 45-59 [doi]
- Multi-Layer Network for Influence Propagation over MicroblogChao Li, Jun Luo, Joshua Zhexue Huang, Jianping Fan. 60-72 [doi]
- A Hybrid System for Online Detection of Emotional DistressTim M. H. Li, Michael Chau, Paul W. C. Wong, Paul S. F. Yip. 73-80 [doi]
- Process Mining and Security: Visualization in Database Intrusion DetectionViet H. Huynh, An N. T. Le. 81-95 [doi]
- Securing Advanced Metering Infrastructure Using Intrusion Detection System with Data Stream MiningMustafa Amir Faisal, Zeyar Aung, John R. Williams, Abel Sanchez. 96-111 [doi]
- A Universal Toolkit for Cryptographically Secure Privacy-Preserving Data MiningDan Bogdanov, Roman Jagomägis, Sven Laur. 112-126 [doi]
- Identifying Walk Cycles for Human RecognitionJakub Valcik, Jan Sedmidubský, Michal Balazia, Pavel Zezula. 127-135 [doi]
- Chinese Organization Name Recognition Based on Multiple FeaturesYajuan Ling, Jing Yang 0001, Liang He. 136-144 [doi]
- A Plagiarism Detection System for Arabic Text-Based DocumentsAmeera Jadalla, Ashraf Elnagar. 145-153 [doi]
- Examining Text Categorization Methods for Incidents AnalysisNurfadhlina Mohd Sharef, Khairul Azhar Kasmiran. 154-161 [doi]
- Multi-Committer Threshold Commitment Scheme from LatticeWeiwei Sun, Bo Yang 0003, Qiong Huang, Sha Ma, XiMing Li. 162-175 [doi]
- Conjunctive Keywords Searchable Encryption with Efficient Pairing, Constant Ciphertext and Short TrapdoorZhenhua Chen, Chunying Wu, Daoshun Wang, Shundong Li. 176-189 [doi]
- A Simultaneous Members Enrollment and Revocation Protocol for Secret Sharing SchemesJia Yu, Shuguang Wang, Huawei Zhao, Minglei Shu, Jia-liang Lv, Qiang Guo. 190-197 [doi]
- SaaS-Driven BotnetsBiao Jiang, Eul-Gyu Im, Yunmo Koo. 198-206 [doi]