Abstract is missing.
- Inferring the Stealthy Bridges Between Enterprise Network Islands in Cloud Using Cross-Layer Bayesian NetworksXiaoyan Sun, Jun Dai, Anoop Singhal, Peng Liu. 3-23 [doi]
- A Secure Architecture for Inter-cloud Virtual Machine MigrationTayyaba Zeb, Abdul Ghafoor Abbasi, Muhammad Awais Shibli, Muhammad Yousaf. 24-35 [doi]
- STRE: Privacy-Preserving Storage and Retrieval over Multiple CloudsJingwei Li, Dan Lin, Anna Cinzia Squicciarini, Chunfu Jia. 36-44 [doi]
- An Effective Search Scheme Based on Semantic Tree Over Encrypted Cloud Data Supporting VerifiabilityZhangjie Fu, Jiangang Shu, Xingming Sun. 45-54 [doi]
- Policy Driven Node Selection in MapReduceAnna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Jingwei Li. 55-72 [doi]
- GridMap: Enhanced Security in Cued-Recall Graphical PasswordsNicolas Van Balen, Haining Wang. 75-94 [doi]
- UAuth: A Strong Authentication Method from Personal Devices to Multi-accountsYazhe Wang, Mingming Hu, Chen Li. 95-104 [doi]
- TPM-Based Authentication Mechanism for Apache HadoopIssa M. Khalil, Zuochao Dou, Abdallah Khreishah. 105-122 [doi]
- An Authentication and Key Management Scheme for Heterogeneous Sensor NetworksSarmad Ullah Khan, Rafiullah Khan, Inam Bari, Naveed Jan. 123-131 [doi]
- Social Authentication Identity: An Alternate to Internet Real Name SystemChengcheng Shao, Liang Chen, Shuo Fan, Xinwen Jiang. 132-140 [doi]
- On the Usability of Two-Factor AuthenticationDing Wang, Ping Wang. 141-150 [doi]
- Securing Resource Discovery in Content Hosting NetworksSushama Karumanchi, Jingwei Li, Anna Cinzia Squicciarini. 153-173 [doi]
- Detection of Botnet Command and Control Traffic by the Identification of Untrusted DestinationsPieter Burghouwt, Marcel E. M. Spruit, Henk J. Sips. 174-182 [doi]
- Keep the Fakes Out: Defending Against Sybil Attack in P2P SystemsKan Chen, Peidong Zhu, Yueshan Xiong. 183-191 [doi]
- Anonymous Publish-Subscribe SystemsBinh Vo, Steven M. Bellovin. 195-211 [doi]
- Friendly Jamming for Secure Localization in Vehicular TransportationBhaswati Deka, Ryan M. Gerdes, Ming Li, Kevin Heaslip. 212-221 [doi]
- Visual-Assisted Wormhole Attack Detection for Wireless Sensor NetworksEirini D. Karapistoli, Panagiotis G. Sarigiannidis, Anastasios A. Economides. 222-238 [doi]
- Implementing an Affordable and Effective GSM IMSI Catcher with 3G AuthenticationMax Suraev. 239-256 [doi]
- A Simple and Novel Technique for Counteracting Exploit KitsByungho Min, Vijay Varadharajan. 259-277 [doi]
- Policy Enforcement Point ModelYosra Ben Mustapha, Hervé Debar, Gregory Blanc. 278-286 [doi]
- Control Flow Obfuscation Using Neural Network to Fight Concolic TestingHaoyu Ma, Xinjie Ma, Weijie Liu, Zhipeng Huang, Debin Gao, Chunfu Jia. 287-304 [doi]
- EFS: Efficient and Fault-Scalable Byzantine Fault Tolerant Systems Against Faulty ClientsQuanwei Cai, Jingqiang Lin, FengJun Li, Qiongxiao Wang, Daren Zha. 305-322 [doi]
- SCADS - Separated Control- and Data-StacksChristopher Kugler, Tilo Müller. 323-340 [doi]
- Improving the Security of the HMQV Protocol Using Tamper-Proof HardwareQianying Zhang, Shijun Zhao, Yu Qin, Dengguo Feng. 343-361 [doi]
- TST: A New Randomness Test Method Based on Coupon Collector's ProblemQinglong Zhang, Zongbin Liu, Quanwei Cai, Ji Xiang. 362-373 [doi]
- Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced PrivacyBoyang Wang, Yantian Hou, Ming Li, Haitao Wang, Hui Li, FengHua Li. 374-394 [doi]
- Hardware Implementation of Cryptographic Hash Function Based on Spatiotemporal ChaosYuling Luo, Junxiu Liu, Lvchen Cao, Jinjie Bi, Senhui Qiu. 395-404 [doi]
- An Information-Theoretic Approach for Secure Protocol CompositionYi-Ting Chiang, Tsan-sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang, Justin Zhan. 405-423 [doi]
- Towards a Systematic Study of the Covert Channel Attacks in SmartphonesSwarup Chandra, Zhiqiang Lin, Ashish Kundu, Latifur Khan. 427-435 [doi]
- DroidKin: Lightweight Detection of Android Apps SimilarityHugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani. 436-453 [doi]
- Detecting Malicious Behaviors in Repackaged Android Apps with Loosely-Coupled Payloads Filtering SchemeLulu Zhang, Yongzheng Zhang 0002, Tianning Zang. 454-462 [doi]
- Defending Blind DDoS Attack on SDN Based on Moving Target DefenseDuohe Ma, Zhen Xu, Dongdai Lin. 463-480 [doi]
- Function Escalation AttackChen Cao, Yuqing Zhang, Qixu Liu, Kai Wang. 481-497 [doi]
- RAMSES: Revealing Android Malware Through String Extraction and SelectionLautaro Dolberg, Quentin Jérôme, Jérôme François, Radu State, Thomas Engel. 498-506 [doi]
- Detecting Mobile Malware with TMSVMXi Xiao, Xianni Xiao, Yong Jiang, Qing Li. 507-516 [doi]
- Research on Credible Regulation Mechanism for the Trading of Digital WorksGuozhen Shi, Ying Shen, FengHua Li, Mang Su, Dong Liu. 519-523 [doi]
- Coordination and Concurrency Aware Likelihood Assessment of Simultaneous AttacksLéa Samarji, Nora Cuppens-Boulahia, Frédéric Cuppens, Serge Papillon, Wael Kanoun, Samuel Dubus. 524-529 [doi]
- Domain Algorithmically Generated Botnet Detection and AnalysisXiaolin Xu, Yonglin Zhou, Qingshan Li. 530-534 [doi]
- Towards Improving Service Accessibility by Adaptive Resource Distribution StrategyJinqiao Shi, Xiao Wang, Binxing Fang, Qingfeng Tan, Li Guo. 535-540 [doi]
- Hybrid Detection Using Permission Analysis for Android MalwareHaofeng Jiao, Xiaohong Li, Lei Zhang, Guangquan Xu, Zhiyong Feng. 541-545 [doi]
- Content Security Scheme for Content Centric NetworksFawad Khan, Sarmad Ullah Khan, Inam Bari. 546-550 [doi]
- Detection of Food Safety Topics Based on SPLDAsJinshuo Liu, Yabo Li, Yingyue Peng, Juan Deng, Xin Chen. 551-555 [doi]
- Platform Neutral Sandbox for Analyzing Malware and Resource Hogger AppsParvez Faruki, Vijay Kumar, Ammar Bharmal, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti. 556-560 [doi]
- JumpBox - A Seamless Browser Proxy for Tor Pluggable TransportsJeroen Massar, Ian Mason, Linda Briesemeister, Vinod Yegneswaran. 563-581 [doi]
- Abusing Browser Address Bar for Fun and Profit - An Empirical Investigation of Add-On Cross Site Scripting AttacksYinzhi Cao, Chao Yang, Vaibhav Rastogi, Yan Chen, Guofei Gu. 582-601 [doi]
- Characterizing Google Hacking: A First Large-Scale Quantitative StudyJialong Zhang, Jayant Notani, Guofei Gu. 602-622 [doi]
- Detecting Malicious Sessions Through Traffic Fingerprinting Using Hidden Markov ModelsSami Zhioua, Adnene Ben Jabeur, Mahjoub Langar, Wael Ilahi. 623-631 [doi]