Abstract is missing.
- A Performance Comparison Study of a Coverage-Preserving Node Scheduling Scheme and Its Enhancement in Sensor NetworksQun Wang, Huanyan Qian, Peiyu Ji, Yu Xie, Shuhui Yang. 3-9 [doi]
- An Improved Authorization Model in Trust NetworkXianming Gao, Xiaozhe Zhang, Baosheng Wang, Huiting Shi. 10-16 [doi]
- KEMF: Key Management for Federated Sensor NetworksPiers O'Hanlon, Joss Wright, Ian Brown, Tulio de Souza. 17-24 [doi]
- \mathrmCPS^2 : A Contextual Privacy Framework for Social SoftwareRula Sayaf, Dave Clarke, Richard Harper. 25-32 [doi]
- Are You Really My Friend? Exactly Spatiotemporal Matching Scheme in Privacy-Aware Mobile Social NetworksBen Niu, Xiuguang Li, Xiaoyan Zhu, Xiaoqing Li, Hui Li. 33-40 [doi]
- RFID Authentication Protocol Resistant to the Man-in-the-Middle AttackLi Zhai, Chuankun Wu. 41-47 [doi]
- METIS: A Two-Tier Intrusion Detection System for Advanced Metering InfrastructuresVincenzo Gulisano, Magnus Almgren, Marina Papatriantafilou. 51-68 [doi]
- Online Detection of Concurrent Prefix HijacksShen Su, Beichuan Zhang, Binxing Fang. 69-83 [doi]
- Countermeasures for Mitigating ICN Routing Related DDoS AttacksEslam G. AbdAllah, Mohammad Zulkernine, Hossam S. Hassanein. 84-92 [doi]
- A New Anomaly Detection Method Based on IGTE and IGFEZiyu Wang, Jiahai Yang, Fuliang Li. 93-109 [doi]
- Forensic Potentials of Solid State DrivesZubair Shah, Abdun Naser Mahmood, Jill Slay. 113-126 [doi]
- Cloud Security from Users Point of View: A Pragmatic Study with Thematic AnalysisSaira Syed, Quazi Mamun. 127-140 [doi]
- A Secure Real Time Data Processing Framework for Personally Controlled Electronic Health Record (PCEHR) SystemKhandakar Rabbi, Mohammed Kaosar, Md Rafiqul Islam, Quazi Mamun. 141-156 [doi]
- Novel Iterative Min-Max Clustering to Minimize Information Loss in Statistical Disclosure ControlAbdun Naser Mahmood, Md. Enamul Kabir, Abdul K. Mustafa. 157-172 [doi]
- Securing Sensor Networks by Moderating FrequenciesPinaki Sarkar, Priyatosh Mahish, Morshed Uddin Chowdhury, Kouichi Sakurai. 173-185 [doi]
- Intelligent Financial Fraud Detection Practices: An InvestigationJarrod West, Maumita Bhattacharya, Rafiqul Islam. 186-203 [doi]
- Network Traffic Pattern Analysis Using Improved Information Theoretic Co-clustering Based Collective Anomaly DetectionMohiuddin Ahmed, Abdun Naser Mahmood. 204-219 [doi]
- A Survey on Mining Program-Graph Features for Malware AnalysisMd. Saiful Islam 0003, Md. Rafiqul Islam 0001, A. S. M. Kayes, Chengfei Liu, Irfan Altas. 220-236 [doi]
- Defence Against Code Injection AttacksHussein Alnabulsi, Quazi Mamun, Md. Rafiqul Islam 0001, Morshed U. Chowdhury. 237-251 [doi]
- False Data Injection Attack Targeting the LTC Transformers to Disrupt Smart Grid OperationAdnan Anwar, Abdun Naser Mahmood, Mohiuddin Ahmed. 252-266 [doi]
- A Domain-Based Multi-cluster SIP Solution for Mobile Ad Hoc NetworkAla' Aburumman, Kim-Kwang Raymond Choo. 267-281 [doi]
- virtio-ct: A Secure Cryptographic Token Service in HypervisorsLe Guan, FengJun Li, Jiwu Jing, Jing Wang, ZiQiang Ma. 285-300 [doi]
- Blind Format String AttacksFatih Kiliç, Thomas Kittel, Claudia Eckert. 301-314 [doi]
- An Empirical Evaluation of Software Obfuscation Techniques Applied to Android APKsFelix C. Freiling, Mykola Protsenko, Yan Zhuang. 315-328 [doi]
- Towards Privacy-Preserving Web Metering via User-Centric HardwareFahad Alarifi, Maribel Fernández. 329-340 [doi]
- Towards Efficient Update of Access Control Policy for Cryptographic Cloud StorageWeiyu Jiang, Zhan Wang, Limin Liu, Neng Gao. 341-356 [doi]
- Uncovering the Dilemmas on Antivirus Software Design in Modern Mobile PlatformsHeqing Huang, Kai Chen 0012, Peng Liu 0005, Sencun Zhu, Dinghao Wu. 359-366 [doi]
- Transplantation Attack: Analysis and PredictionZhongwen Zhang, Ji Xiang, Lei Wang, Lingguang Lei. 367-374 [doi]
- Timing-Based Clone Detection on Android MarketsYingjun Zhang, Kezhen Huang, Yuling Liu, Kai Chen 0012, Liang Huang, Yifeng Lian. 375-381 [doi]
- A New Trust Chain Security Evaluation Model and ToolWei Hu, Dongyao Ji, Ting Wang, Gang Yao. 382-391 [doi]
- A System for Privacy Information Analysis and Safety Assessment of iOS ApplicationsBin Li, Zhijie Feng. 392-398 [doi]
- How We Found These Vulnerabilities in Android ApplicationsBin Ma. 399-406 [doi]