Abstract is missing.
- Using Technology to Build CompassionNigel Jacob. 1 [doi]
- MP4 Steganography: Analyzing and Detecting TCStegAnthony Ramirez, Alfredo Fernandez. 2-6 [doi]
- Analysis of Parallel Architectures for Network Intrusion DetectionRicardo A. Calix, Armando Cabrera, Irshad Iqbal. 7-12 [doi]
- Architecture-Driven Penetration Testing against an Identity Access Management (IAM) SystemSam Chung, Cheolmin Sky Moon, Barbara Endicott-Popovsky. 13-18 [doi]
- Measuring Stylus and Tablet Performance for Usability in SketchingRichard Helps, Clarissa Helps. 19-24 [doi]
- Effects of using iPads on First Grade Students' Achievements in Arabic Language Classes In Saudi ArabiaDeborah LaBelle, Jawaher Alsulami, Jim Leone. 25-28 [doi]
- The Paradox of Social Media Security: Users' Perceptions versus BehaviorsZahra Alqubaiti, Lei Li, Jing He. 29-34 [doi]
- Curiosity Killed the Organization: A Psychological Comparison between Malicious and Non-Malicious Insiders and the Insider ThreatMarc J. Dupuis, Samreen Khadeer. 35-40 [doi]
- In Search of Effective Honeypot and Honeynet Systems for Real-Time Intrusion Detection and PreventionAmos O. Olagunju, Farouk Samu. 41-46 [doi]
- Investigating the Security of Nexus 1000V Virtual Switches in VMware ESXi HypervisorsRaymond A. Hansen, Benjamin Peterson, Timothy Becker. 47-52 [doi]
- Impact of the Physical Web and BLE BeaconsDebasis Bhattacharya, Mario Canul, Saxon Knight. 53 [doi]
- Active Snort Rules and the Needs for Computing Resources: Computing Resources Needed to Activate Different Numbers of Snort RulesChad A. Arney, Xinli Wang. 54 [doi]
- "Wait, Do I Know You?": A Look at Personality and Preventing One's Personal Information from being CompromisedMarc J. Dupuis. 55 [doi]