Abstract is missing.
- Privacy in Social MediaErdal Ozkaya, Rafiqul Islam. 3-10 [doi]
- SecControl: Bridging the Gap Between Security Tools and SDN ControllersLi Wang, Dinghao Wu. 11-31 [doi]
- An Effective Approach for Dealing with the Pressure to Compromise Security During Systems DevelopmentYeslam Al-Saggaf. 32-46 [doi]
- Securing Websites Against Homograph AttacksJemal H. Abawajy, A. Richard, Zaher Al Aghbari. 47-59 [doi]
- Privacy Threat Analysis of Mobile Social Network Data PublishingJemal H. Abawajy, Mohd Izuan Hafez Ninggal, Zaher Al Aghbari, Abdul Basit Darem, Asma Alhashmi. 60-68 [doi]
- Exploring Secure Communication in VANET BroadcastingMuhammad Jafer, M. Arif Khan, Sabih ur Rehman, Tanveer A. Zia. 69-84 [doi]
- Identification of Forensic Artifacts in VMWare Virtualized ComputingCory Smith, Glenn Dietrich, Kim-Kwang Raymond Choo. 85-103 [doi]
- Possible Keyloggers Without Implementing a Keyboard in AndroidItzael Jiménez Aranda, Eleazar Aguirre Anaya, Raúl Acosta Bermejo, Ponciano Jorge Escamilla-Ambrosio. 104-112 [doi]
- A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)Md Samsul Haque, Morshed U. Chowdhury. 113-122 [doi]
- Securing Healthcare Data Using Biometric AuthenticationSharmin Jahan, Mozammel Chowdhury, Rafiqul Islam, Junaid Ahsenali Chaudhry. 123-132 [doi]
- Fast and Robust Biometric Authentication Scheme Using Human EarMozammel Chowdhury, Rafiqul Islam, Junbin Gao. 133-144 [doi]
- WebAD ^2 2 : A Cascading Model Based on Machine Learning for Web Attacks DetectionYing Lin, Bo Li. 145-165 [doi]
- Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social NetworksKen Eustace, Rafiqul Islam, Philip Tsang, Geoff Fellows. 166-181 [doi]
- Hiding Fast Flux Botnet in Plain Email SightZhi Wang, Meilin Qin, Mengqi Chen, Chunfu Jia. 182-197 [doi]
- Cyber Security Decision Support for Remediation in Automated Computer Network DefenceMaxwell G. Dondo. 198-217 [doi]
- Situational Crime Prevention and the Mitigation of Cloud Computing ThreatsChaz Vidal, Kim-Kwang Raymond Choo. 218-233 [doi]
- ABCPro: An Access Control Model for Social Networks with Translucent User ProvenanceLorena González-Manzano, Mark Slaymaker, José María de Fuentes, Dimitris Vayenas. 234-252 [doi]
- SAFEDroid: Using Structural Features for Detecting Android MalwaresSevil Sen, Ahmet Ilhan Aysan, John A. Clark. 255-270 [doi]
- Manipulating the Five V's in the Next Generation Air Transportation SystemDustin Mink, William Bradley Glisson, Ryan Benton, Kim-Kwang Raymond Choo. 271-282 [doi]
- A Framework for Acquiring and Analyzing Traces from Cryptographic DevicesAlfonso Blanco Blanco, José María de Fuentes, Lorena González-Manzano, Luis Hernández Encinas, Agustín Martín Muñoz, José Luis Rodrigo Oliva, J. Ignacio Sánchez García. 283-300 [doi]
- Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted?Eirini Anthi, George Theodorakopoulos. 301-319 [doi]
- Fault-Tolerant and Scalable Key Management Protocol for IoT-Based Collaborative GroupsMohammed Riyadh Abdmeziem, François Charoy. 320-338 [doi]