Abstract is missing.
- Examining the impact of privacy, Security, and trust on the TAM and TTF models for e-commerce consumers: A pilot studySujit Kumar Basak, Desmond Wesley Govender, Irene Govender. 19-26 [doi]
- A logical approach to promoting trust over knowledge to trust over actionAaron Hunter. 27-34 [doi]
- AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access controlMahendra Pratap Singh. 35-41 [doi]
- Edge-calibrated noise for differentially private mechanisms on graphsSolenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier. 42-49 [doi]
- Exploiting known vulnerabilities of a smart thermostatMike Moody, Aaron Hunter. 50-53 [doi]
- Masquerade of mobile applications: Introducing unlinkability in a practical wayHuan Feng, Kang G. Shin. 54-61 [doi]
- Dynamic Weight on Static Trust for trustworthy social media networksMohammad Khaliqur Rahman, Muhammad Abdullah Adnan. 62-69 [doi]
- Automated intelligent multinomial classification of malware species using dynamic behavioural analysisAndrii Shalaginov, Katrin Franke. 70-77 [doi]
- Correlating cyber incident information to establish situational awareness in Critical InfrastructuresGiuseppe Settanni, Yegor Shovgenya, Florian Skopik, Roman Graf, Markus Wurzenberger, Roman Fiedler. 78-81 [doi]
- Study on privacy setting acceptance of drivers for data utilization on connected carsToshiki Endo, Kazunari Nawa, Naonori Kato, Yosuke Murakami. 82-87 [doi]
- Proposition of a method to aid Security Classification in Cybersecurity contextGuillaume Collard, Eric Disson, Guilaine Talens, Stephane Ducroquet. 88-95 [doi]
- An Internet-wide view of ICS devicesAriana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael Bailey. 96-103 [doi]
- A continuous user authentication scheme for mobile devicesMax Smith-Creasey, Muttukrishnan Rajarajan. 104-113 [doi]
- Dynamic graph-based malware classifierHossein Hadian Jazi, Ali A. Ghorbani. 112-120 [doi]
- Decentralized and sybil-resistant pseudonym registration using social graphsSebastian Friebe, Martin Florian, Ingmar Baumgart. 121-128 [doi]
- I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malwareFabio Martinelli, Francesco Mercaldo, Andrea Saracino, Corrado Aaron Visaggio. 129-136 [doi]
- Formalising Identity Management protocolsMd. Sadek Ferdous, Ron Poet. 137-146 [doi]
- Attacking Android smartphone systems without permissionsSu Mon Kywe, Yingjiu Li, Kunal Petal, Michael Grace. 147-156 [doi]
- KidsTube: Detection, characterization and analysis of child unsafe content & promoters on YouTubeRishabh Kaushal, Srishty Saha, Payal Bajaj, Ponnurangam Kumaraguru. 157-164 [doi]
- Secure intra-device communication protocol between applications on a smart devicePei-Shan Chang, Hoon Sin Cheong, Hon Loon Wong, Seyedvahid Dianat, Cheong Seak Sea. 165-169 [doi]
- Dr. WATTson: Lightweight current-based Intrusion Detection (CBID)Robert Koch 0002, Teo Kuhn, Marcel Odenwald, Gabi Dreo Rodosek. 170-177 [doi]
- Toward an off-line analysis of obligation with deadline policiesNada Essaouini, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens. 178-186 [doi]
- Measuring code reuse in Android appsHugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani. 187-195 [doi]
- Understanding victim-enabled identity theftDavid Lacey, Jim Zaiss, K. Suzanne Barber. 196-202 [doi]
- Mobile forensics for cloud data: Practical and legal considerationsJohn Bjornson, Aaron Hunter. 203-206 [doi]
- Building robust temporal user profiles for anomaly detection in file system accessesShagufta Mehnaz, Elisa Bertino. 207-210 [doi]
- Know your master: Driver profiling-based anti-theft methodByung Il Kwak, Jiyoung Woo, Huy Kang Kim. 211-218 [doi]
- Using machine learning to secure IoT systemsJanice Canedo, Anthony Skjellum. 219-222 [doi]
- A survey on internet usage and cybersecurity awareness in studentsSreenivas Sremath Tirumala, Abdolhossein Sarrafzadeh, Paul Pang. 223-228 [doi]
- Privacy-preserving two-party bartering secure against active adversariesStefan Wüller, Wadim Pessin, Ulrike Meyer, Susanne Wetzel. 229-238 [doi]
- CloudEFS: Efficient and secure file system for cloud storageClemens Zeidler, Muhammad Rizwan Asghar. 239-246 [doi]
- Prevention of information mis-translation by a malicious gateway in connected vehiclesKyusuk Han, Kang G. Shin. 247-254 [doi]
- Privacy-preservation in the integration and querying of multidimensional data modelsMichael Mireku Kwakye, Ken Barker. 255-263 [doi]
- USBee: Air-gap covert-channel via electromagnetic emission from USBMordechai Guri, Matan Monitz, Yuval Elovici. 264-268 [doi]
- Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniquesMehrdad Nojoumian. 269-274 [doi]
- Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery ProtocolIznan H. Hasbullah, Mohammad M. Kadhum, Yung-Wey Chong, Kamal Alieyan, Azlan Osman, Supriyanto. 275-281 [doi]
- Comparative performance analysis of classification algorithms for intrusion detection systemMohammed Anbar, Rosni Abdullah, Iznan H. Hasbullah, Yung-Wey Chong, Omar E. Elejla. 282-288 [doi]
- Study on privacy setting acceptance of the drivers for the data utilization on the carNaonori Kato, Yosuke Murakami, Toshiki Endo, Kazunari Nawa. 287-293 [doi]
- Survey of secure anonymous peer to peer Instant Messaging protocolsRakan Alkhulaiwi, Abdulhakim Sabur, Khalid Aldughayem, Osama Almanna. 294-300 [doi]
- libmask: Protecting browser JIT engines from the devil in the constantsAbhinav, Mohit Mishra, Benoit Baudry. 301-308 [doi]
- User behaviour and interactions for multimodal authenticationGaloh Rashidah Haron, Dharmadharshni Maniam, Latifah Mat Nen, Nor Izyani Daud. 309-316 [doi]
- Analyzing flow-based anomaly intrusion detection using Replicator Neural NetworksCarlos Garcia Cordero, Sascha Hauke, Max Mühlhäuser, Mathias Fischer. 317-324 [doi]
- Remote website authentication using dynamic multi-scale code visualizationAlwyn Goh, Hoon Sin Cheong, Geong Sen Poh, Seyedvahid Dianat. 325-328 [doi]
- User-in-a-context: A blueprint for context-aware identificationAnirban Basu, Rui Xu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto. 329-334 [doi]
- Improvement of information rates for specified participants in general secret sharing schemesKouya Tochikubo. 333-340 [doi]
- Magic mantle using social VPNs against centralized social networking servicesYasushi Shinjo, Naoki Kainuma, Daiyuu Nobori, Akira Sato. 341-348 [doi]
- On the security advantages of block-based multiserver searchable symmetric encryptionMoesfa Soeheila Mohamad, Ji-Jian Chin, Geong Sen Poh. 349-352 [doi]
- Controlling risks and fraud in affiliate marketing: A simulation and testing environmentBede Ravindra Amarasekara, Anuradha Mathrani. 353-360 [doi]
- SCARAB: A continuous authentication scheme for biomedical applicationAnindya Shankar Bhandari, Dipanwita Roy Chowdhury. 361-367 [doi]
- Continuous authentication using EEG and face images for trusted autonomous systemsMin Wang, Hussein A. Abbass, Jiankun Hu. 368-375 [doi]
- Scalability and performance of the Privacy-Aware Classification method GenPACNico Schlitter, Markus Ullrich, Jörg Lässig. 376-383 [doi]
- Provenance threat modelingOluwakemi Hambolu, Lu Yu, Jon Oakley, Richard R. Brooks, Ujan Mukhopadhyay, Anthony Skjellum. 384-387 [doi]
- OverTorrent: Anticensorship without centralized serversYu-Ju Lee, Eric Wustrow. 388-391 [doi]
- Towards privacy-preserving classification in neural networksMehmood Baryalai, Julian Jang-Jaccard, Dongxi Liu. 392-399 [doi]
- PlayGround 2.0: Simulating behavior decisions with trust and control computationsEtienne Cartolano, Antonio Mauro Saraiva, Robert D. Stevenson. 400-406 [doi]
- iGenoPri: Privacy-preserving genomic data processing with integrity and correctness proofsFatih Turkmen, Muhammad Rizwan Asghar, Yuri Demchenko. 407-410 [doi]
- Generating software identifier dictionaries from Vulnerability DatabaseTakeshi Takahashi, Daisuke Inoue. 417-420 [doi]
- Analysis of NTP DRDoS attacks' performance effects and mitigation techniquesBahman A. Sassani, Charly Abarro, Ivan Pitton, Craig Young, Farhad Mehdipour. 421-427 [doi]
- LoTrust: A social Trust Level model based on time-aware social interactions and interests similarityAhlem Kalaï, Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous. 428-436 [doi]
- Intention-based Trust Re-evaluationAbdulaziz Almehmadi, Khalil El-Khatib. 437-444 [doi]
- Securing cloud data using information dispersalKheng Kok Mar, Zhengqing Hu, Chee Yong Law, Meifen Wang. 445-448 [doi]
- A security analysis of techniques for long-term integrity protectionMatthias Geihs, Denise Demirel, Johannes A. Buchmann. 449-456 [doi]
- Vulnerability analysis of iPhone 6WenCheng Yang, Jiankun Hu, Clinton Fernandes, Vijay Sivaraman, Qianhong Wu. 457-463 [doi]
- Follow the traffic: Stopping click fraud by disrupting the value chainMatthieu Faou, Antoine Lemay, David Decary-Hetu, Joan Calvet, Francois Labreche, Militza Jean, Benoit Dupont, José M. Fernandez. 464-476 [doi]
- Securing promiscuous use of untrusted USB thumb drives in Industrial Control SystemsFederico Griscioli, Maurizio Pizzonia. 477-484 [doi]
- Towards automatic repair of access control policiesDianxiang Xu, Shuai Peng. 485-492 [doi]
- USBCheckIn: Preventing BadUSB attacks by forcing human-device interactionFederico Griscioli, Maurizio Pizzonia, Marco Sacchetti. 493-496 [doi]
- A vessel segmentation method for low contrast CT angiography imageRong Zhu, Yun Mao, Ying Guo. 497-501 [doi]
- Cryptanalysis of Lee and Lin's innovative electronic group-buying systemChin-Ling Chen, Yong-Yuan Deng, Yun-Ciao Wang. 502-505 [doi]
- Generating behavior-based malware detection models with genetic programmingTobias Wüchner, Martín Ochoa, Enrico Lovat, Alexander Pretschner. 506-511 [doi]
- A constraint-driven approach for dynamic malware detectionMario Luca Bernardi, Marta Cimitile, Damiano Distante, Francesco Mercaldo. 512-519 [doi]
- I've been - Web analytics from a user's point of viewMichael T. Krieger, Josef Küng. 520-527 [doi]
- 3: Adaptive social secret sharing for distributed storage systemsGiulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes A. Buchmann. 528-535 [doi]
- A novel hash chain construction for simple and efficient authenticationYuta Kurihara, Masakazu Soshi. 539-542 [doi]
- Efficient proactive secret sharingJacqueline Brendel, Denise Demirel. 543-550 [doi]
- Effective frameworks for delivering compliance with personal data privacy regulatory requirementsIlya Kabanov. 551-554 [doi]
- Multidimensional range query on outsourced database with strong privacy guaranteeHoang Giang Do, Wee Keong Ng. 555-560 [doi]
- An IoT trust and reputation model based on recommender systemsSarah Asiri, Ali Miri. 561-568 [doi]
- Secure image data deduplication through compressive sensingFatema Rashid, Ali Miri. 569-572 [doi]
- Study on relationship between user awareness and QoE in communication delay on smartphonesTakeharu Shirai, Masahiro Fujita, Daisuke Arai, Tomohiko Ogishi, Masakatsu Nishigaki. 573-580 [doi]
- A novel trust model based on SLA and behavior evaluation for cloudsZhenhua Tan, Yicong Niu, Yuan Liu, Guangming Yang. 581-587 [doi]
- Directcha: A proposal of spatiometric mental rotation CAPTCHAAyane Sano, Masahiro Fujita, Masakatsu Nishigaki. 585-592 [doi]
- Behavior-based tracking of Internet users with semi-supervised learningDominik Herrmann, Matthias Kirchler, Jens Lindemann, Marius Kloft. 596-599 [doi]
- Users' perspective on designing inclusive privacy-enhancing indicatorsHsiao-Ying Huang, Masooda Bashir. 600-607 [doi]
- Data leakage detection in Tizen Web applicationsThiago S. Rocha, Eduardo Souto, Brandell Cassio, Diego Azulay, Alex Monteiro, Felipe Boeira, Pedro Minatel, Breno Silva. 608-614 [doi]
- Towards a new generation of industrial firewalls: Operational-process aware filteringSafaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia. 615-622 [doi]
- Intrusion detection in a private network by satisfying constraintsMd Siam Hasan, Ali ElShakankiry, Thomas Dean, Mohammad Zulkernine. 623-628 [doi]
- Taxonomy of malware detection techniques: A systematic literature reviewHanif-Mohaddes Deylami, Ravie Chandren Muniyandi, Iman Tabatabaei Ardekani, Abdolhossein Sarrafzadeh. 629-636 [doi]
- Analysis and forensics for Behavior Characteristics of Malware in InternetPing Ren, Wu Liu, Donghong Sun, Jian-Ping Wu, Ke Liu. 637-641 [doi]
- An optical covert-channel to leak data through an air-gapMordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici. 642-649 [doi]
- Peeking behind the great firewall: Privacy on Chinese file sharing networksMatthew Comb, Paul A. Watters. 650-656 [doi]
- Privacy patternsClark D. Thomborson. 656-663 [doi]
- Sampling and partitioning for differential privacyHamid Ebadi, Thibaud Antignac, David Sands. 664-673 [doi]
- Analysing vulnerability reproducibility for Firefox browserMaryam Davari, Mohammad Zulkernine. 674-681 [doi]
- How students regard trust in an elearning contextNatasha Dwyer, Stephen Marsh 0001. 682-685 [doi]
- Generation of one-time keys for single line authenticationSazzad Hossain, Alwyn Goh, Cheong Hoon Sin, Kay Win Lee. 686-689 [doi]
- A text independent handwriting forgery detection system based on branchlet features and Gaussian mixture modelsChin-Shyurng Fahn, Chu-Ping Lee, Heng-I Chen. 690-697 [doi]
- Challenge response interaction for biometric liveness establishment and template protectionMunalih Ahmad Syarif, Latifah Mat Nen, Alwyn Goh, Kay Win Lee, Kang Siong Ng, Leslie Ching Ow Tiong. 698-701 [doi]
- Digital signature scheme based on truncated polynomial over finite fieldsMaheswara Rao Valluri. 702-705 [doi]
- PISCES: A framework for privacy by design in IoTNoria Foukia, David Billard, Eduardo Solana. 706-713 [doi]
- A security analysis of police computer systemsBenjamin VanderSloot, Stuart Wheaton, J. Alex Halderman. 714-721 [doi]
- Implementing Attestable kiosksMatthew Bernhard, Gabe Stocco, J. Alex Halderman. 722-729 [doi]
- Non-invertible fingerprint template protection with polar transformationsLimei Guo, Yun Mao, Ying Guo. 730-735 [doi]
- Automating Information Security assessments using intelligent software agentsClemens Martin, Rania Nasr, Mark Hoersken, Tobias Fuechtler. 736-744 [doi]
- A brief survey of Cryptocurrency systemsUjan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu, Richard R. Brooks. 745-752 [doi]