Abstract is missing.
- A Mobile Botnet That Meets Up at TwitterYulong Dong, Jun Dai, Xiaoyan Sun. 3-21 [doi]
- Detecting Suspicious Members in an Online Emotional Support ServiceYu Li, Dae-Wook Kim, Junjie Zhang, Derek Doran. 22-42 [doi]
- Towards a Reliable and Accountable Cyber Supply Chain in Energy Delivery System Using BlockchainXueping Liang, Sachin Shetty, Deepak K. Tosh, Yafei Ji, Danyi Li. 43-62 [doi]
- Social Bot Detection Using Tweets SimilarityYahan Wang, Chunhua Wu, Kangfeng Zheng, Xiujuan Wang. 63-78 [doi]
- A Multi-protocol Authentication Shibboleth Framework and Implementation for Identity FederationMengyi Li, Chi-Hung Chi, Chen Ding, Raymond K. Wong, Zhong She. 81-101 [doi]
- SDN-Assisted Network-Based Mitigation of Slow DDoS AttacksThomas Lukaseder, Lisa Maile, Benjamin Erb, Frank Kargl. 102-121 [doi]
- A Holistic Approach Towards Peer-to-Peer Security and Why Proof of Work Won't DoBernd PrĂ¼nster, Dominik Ziegler, Christian Kollmann, Bojan Suzic. 122-138 [doi]
- A Robust Intrusion Detection Network Using Thresholdless Trust Management System with Incentive DesignAmir Rezapour, Wen-Guey Tzeng. 139-154 [doi]
- A Metapolicy Framework for Enhancing Domain Expressiveness on the InternetGaurav Varshney, Pawel Szalachowski. 155-170 [doi]
- Adaptive Deterrence of DNS Cache PoisoningSze Yiu Chau, Omar Chowdhury, Victor Gonsalves, Huangyi Ge, Weining Yang, Sonia Fahmy, Ninghui Li. 171-191 [doi]
- Mission-Oriented Security Model, Incorporating Security Risk, Cost and PayoutSayed M. Saghaian N. E., Tom La Porta, Trent Jaeger, Z. Berkay Celik, Patrick D. McDaniel. 192-212 [doi]
- On the Feasibility of Fine-Grained TLS Security Configurations in Web Browsers Based on the Requested Domain NameEman Salem Alashwali, Kasper Rasmussen. 213-228 [doi]
- Neural Network Based Min-entropy Estimation for Random Number GeneratorsJing Yang, Shuangyi Zhu, Tianyu Chen, Yuan Ma, Na Lv, Jingqiang Lin. 231-250 [doi]
- Improved Quantum Key Distribution Networks Based on Blom-SchemeYa-Qi Song, Li Yang. 251-270 [doi]
- Implementation of High Throughput XTS-SM4 Module for Data Storage DevicesLiang Zheng, Changting Li, Zongbin Liu, Lingchen Zhang, Cunqing Ma. 271-290 [doi]
- Detecting and Defending Against Certificate Attacks with Origin-Bound CAPTCHAsAdil Ahmad, Faizan Ahmad, Lei Wei, Vinod Yegneswaran, Fareed Zaffar. 291-308 [doi]
- FrameHanger: Evaluating and Classifying Iframe Injection at Large ScaleKe Tian, Zhou Li, Kevin D. Bowers, Danfeng (Daphne) Yao. 311-331 [doi]
- Xilara: An XSS Filter Based on HTML Template RestorationKeitaro Yamazaki, Daisuke Kotani, Yasuo Okabe. 332-351 [doi]
- Local Storage on Steroids: Abusing Web Browsers for Hidden Content Storage and DistributionJuan D. Parra Rodriguez, Joachim Posegga. 352-371 [doi]
- A Review and Costing of Lightweight Authentication Schemes for Internet of Things (IoT): Towards Design of an Authentication Architecture for Smart Home ApplicationsAttlee M. Gamundani, Amelia Phillips, Hippolyte N. Muyingi. 375-390 [doi]
- A Survey of Big Data Security Solutions in HealthcareMusfira Siddique, Muhammad Ayzed Mirza, Mudassar Ahmad, Junaid Chaudhry, Rafiqul Islam. 391-406 [doi]
- Malware Detection for Healthcare Data SecurityMozammel Chowdhury, Sharmin Jahan, Rafiqul Islam, Junbin Gao. 407-416 [doi]
- Secure Communication on NoC Based MPSoCGaurav Sharma 0006, Soultana Ellinidou, Veronika Kuchta, Rajeev Anand Sahu, Olivier Markowitch, Jean-Michel Dricot. 417-428 [doi]
- Online Radicalisation Along a Continuum: From When Individuals Express Grievances to When They Transition into ExtremismYeslam Al-Saggaf. 429-440 [doi]
- A Multiple Linear Regression Based High-Performance Error Prediction Method for Reversible Data HidingBin Ma, Xiaoyu Wang, Bing Li, Yunqing Shi. 441-452 [doi]
- A Secure AODV Protocol Improvement Scheme Based on Fuzzy Neural NetworkTongyi Xie, Jiawei Mo, Baohua Huang. 453-467 [doi]
- What's in a Downgrade? A Taxonomy of Downgrade Attacks in the TLS Protocol and Application Protocols Using TLSEman Salem Alashwali, Kasper Rasmussen. 468-487 [doi]
- An Approach to Enhance Understanding of Digital Forensics Technical Terms in the Presentation Phase of a Digital Investigation Using Multimedia PresentationsNiken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, Helen Ashman. 488-506 [doi]
- Event Reconstruction of Indonesian E-Banking Services on Windows Phone DevicesNiken Dwi Wahyu Cahyani, Ben Martini, Kim-Kwang Raymond Choo, Helen Ashman. 507-521 [doi]