Abstract is missing.
- Formal analysis of event-driven cyber physical systemsJayaraj Poroor, Bharat Jayaraman. 1-8 [doi]
- Reconciliation engine and metric for network vulnerability assessmentHiran V. Nath, K. Gangadharan, M. Sethumadhavan. 9-21 [doi]
- Detection of packed malwareDhruwajita Devi, Sukumar Nandi. 22-26 [doi]
- A secure and optimized mobile payment framework with formal verificationShaik Shakeel Ahamad, V. N. Sastry, Siba K. Udgata. 27-35 [doi]
- Detection of StegoBot: a covert social network botnetV. Natarajan, Shina Sheen, R. Anitha. 36-41 [doi]
- Chronicle security against covert crawlingGarima Jain, Yatin Mehandiratta. 42-50 [doi]
- RFID security in the context of "internet of things"Renu Aggarwal, Manik Lal Das. 51-56 [doi]
- Implementing side-channel attacks on suggest boxes in web applicationsSampreet A. Sharma, Bernard L. Menezes. 57-62 [doi]
- Searching in internet of things using VCSMitul Shah, Anjali Sardana. 63-67 [doi]
- An identity based encryption using elliptic curve cryptography for secure M2M communicationB. S. Adiga, P. Balamuralidhar, M. A. Rajan, Ravishankara Shastry, V. L. Shivraj. 68-74 [doi]
- Negotiation-based privacy preservation scheme in internet of things platformArijit Ukil, Soma Bandyopadhyay, Joel Joseph, Vijayanand Banahatti, Sachin Lodha. 75-84 [doi]
- API call-grams to identify malicious PE filesParvez Faruki, Vijay Laxmi, M. S. Gaur, P. Vinod. 85-91 [doi]
- Cross-layer coding improves quality and security in wireless video sensor networksXavier N. Fernando, K. Thambu. 92-95 [doi]
- SPADE: Signature based PAcker DEtectionSmita Naval, Vijay Laxmi, M. S. Gaur, P. Vinod. 96-101 [doi]
- Digital evidence detection in virtual environment for cloud computingDigambar Powar, G. Geethakumari. 102-106 [doi]
- Security challenges for the intelligent transportation systemMeiyuan Zhao, Jesse Walker, Chieh-Chih Wang. 107-115 [doi]
- How confident are you to counter uncertainty?Parman Sukarno, Nandita Bhattacharjee, Bala Srinivasan. 116-125 [doi]
- Analysis of mobile authentication protocols by SVO logicAbdullah M. Almuhaideb, Bala Srinivasan, Phu Dung Le, Campbell Wilson, Vishv Malhotra. 126-134 [doi]
- Run-time prediction and preemption of configuration attacks on embedded process controllersLee W. Lerner, Mohammed M. Farag, Cameron D. Patterson. 135-144 [doi]
- A more efficient and faster pairing computation with cryptographic securityI. Praveen, M. Sethumadhavan. 145-149 [doi]
- Automotive functional safety = safety + securitySimon Burton, Jürgen Likkei, Priyamvadha Vembar, Marko Wolf. 150-159 [doi]
- Evaluation on multivariate correlation analysis based denial-of-service attack detection systemZhiyuan Tan, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu. 160-164 [doi]
- Re-architecture of database software stack with planner module for query optimization in a cloud environmentKamalanathan Kandasamy, Krishnashree Achuthan. 165-171 [doi]
- Trust & security RTD in the internet of things: opportunities for international cooperationJames Clarke, Rodrigo Roman Castro, Abhishek Sharma, Javier Lopez, Neeraj Suri. 172-178 [doi]
- adsvm: pre-processor plug-in using support vector machine algorithm for SnortAnnie George, Prabaharan Poornachandran, M. Ramachandra Kaimal. 179-184 [doi]
- Obfuscated malware detection using API call dependencyChinmaya Kumar Patanaik, Ferdous A. Barbhuiya, Sukumar Nandi. 185-193 [doi]
- Restraining add-on's behavior in private browsingD. Bapat Ameya, Alwyn Rohan Pais. 194-199 [doi]
- Identity management framework for cloud based internet of thingsSusmita Horrow, Anjali Sardana. 200-203 [doi]
- CRYPE: towards cryptographically enforced and privacy enhanced WBANsG. K. Ragesh, K. Baskaran. 204-209 [doi]
- A secure and efficient registration for IP mobilitySenthil Kumar Mathi, M. L. Valarmathi, G. Ramprasath. 210-215 [doi]
- Towards application classification with vulnerability signatures for IDS/IPSDhiren, Maulik, Hardik Joshi, Bhadresh K. Patel. 216-221 [doi]
- Randomized symmetric block encryptionB. Dinesh Reddy, V. Valli Kumari, Kvsvn Raju. 222-226 [doi]
- Performance evaluation of an ant colony based routing algorithm in the presence of a misbehaving nodeUsha Banerjee, K. V. Arya, Geetika Gupta, Sakshi Sharma. 227-233 [doi]
- Cache based approach for improving location based query processing in mobile environmentM. Marfa, Subu Surendran, Sabu M. Thampi, T. Radhakrishnan. 234-238 [doi]
- Reducing the energy consumption in wireless sensor networks using delay aware dynamic routing protocolN. Kaleeswari, K. Baskaran. 239-245 [doi]
- Integer partitioning based encryption for privacy preservation in data miningV. Rajalakshmi, G. S. Anandha Mala. 246-251 [doi]