Abstract is missing.
- Enhancing the ArchiMate® standard with a responsibility modeling language for access rights managementChristophe Feltus, Eric Dubois 0001, Erik Proper, Iver Band, Michaël Petit. 12-19 [doi]
- Split personality malware detection and defeating in popular virtual machinesAnjana V. Kumar, Kalpa Vishnani, K. Vinay Kumar. 20-26 [doi]
- A concept of unification of network security policiesDmitry Chernyavskiy, Natalia G. Miloslavskaya. 27-32 [doi]
- Botnets: a heuristic-based detection frameworkLuís Mendonça, Henrique Santos. 33-40 [doi]
- Analysis of a secure cooperative channel sensing protocol for cognitive radio networksGeong Sen Poh, Kok-Lim Alvin Yau, Mee Hong Ling. 41-46 [doi]
- Enforcement of access control policy for mobile ad hoc networksSoumya Maity, Soumya Kanti Ghosh. 47-52 [doi]
- Detection of incorrect position information using speed and time span verification in VANETJyoti Grover, Manoj Singh Gaur, Vijay Laxmi, Rakesh Kumar Tiwari. 53-59 [doi]
- Randomness analysis on LED block ciphersHerman Isa, Muhammad Reza Z'aba. 60-66 [doi]
- A novel framework for intrusion detection in cloudChirag Modi, Dhiren R. Patel, Bhavesh Borisaniya, Avi Patel, Muttukrishnan Rajarajan. 67-74 [doi]
- The method of optimizing the automatic vulnerability validationEugene Tumoyan, Daria Kavchuk. 75-78 [doi]
- Ensemble-based DDoS detection and mitigation modelSajal Bhatia, Desmond Schmidt, George M. Mohay. 79-86 [doi]
- Feature analysis for the blind-watermarked electroencephalogram signal in wireless telemonitoring using Alattar's methodNilanjan Dey, Poulami Das, Sheli Sinha Chaudhuri, Achintya Das. 87-94 [doi]
- An efficient fuzzy controller based technique for network traffic classification to improve QoSAjay Chaudhary, Manoj Misra, Anjali Sardana. 95-102 [doi]
- Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automataPawan Kumar, Virendra Singh. 103-110 [doi]
- Classification of polymorphic and metamorphic malware samples based on their behaviorKsenia Tsyganok, Evgeny Tumoyan, Liudmila K. Babenko, Maxim Anikeev. 111-116 [doi]
- A region specific robust watermarking scheme based on singular value decompositionPriyanka Singh, Suneeta Agarwal. 117-123 [doi]
- Building of alphabetic data protection cryptosystems on the base of equal power knapsacks with Diophantine problemsValeriy Osipyan. 124-129 [doi]
- API call-grams to detect portable executable malwareParvez Faruki, Vijay Laxmi, M. S. Gaur, P. Vinod. 130-137 [doi]
- Research about strength of GOST 28147-89 encryption algorithmLudmila K. Babenko, Evgeniya Ishchukova, Ekaterina Maro. 138-142 [doi]
- Anomaly based intrusion detection using meta ensemble classifierDebojit Boro, Bernard Nongpoh, Dhruba K. Bhattacharyya. 143-147 [doi]
- SIRIS: secure IRIS authentication systemPriyanka Loya, Alwyn Roshan Pais. 148-152 [doi]
- Efficient image encryption and decryption using discrete wavelet transform and fractional Fourier transformPrerana Sharma, Devesh Mishra, Ankur Agarwal. 153-157 [doi]
- Methods of automated analysis of vendor specific implementation of stateful-filtrationEvgeny Sergeevich Abramov, Elena Barannik, Oleg B. Makarevich. 158-162 [doi]
- Detection of NDP based attacks using MLDGunjan Bansal, Niteesh Kumar, Sukumar Nandi, Santosh Biswas. 163-167 [doi]
- Hybridization of DCTune and psycho-visual saliency model to improve security and capacity in DCT based image watermarkingApurba Das, S. Kavitha. 168-172 [doi]
- Lip peripheral motion for visual surveillancePreety Singh, Vijay Laxmi, Manoj Singh Gaur. 173-177 [doi]
- Fusion of multiple data mining techniques for effective network intrusion detection: a contemporary approachA. M. Chandrashekar, K. Raghuveer. 178-182 [doi]
- (Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic sharesKunal Sain, Mradula Sharma, Suneeta Agarwal. 183-187 [doi]
- Detection attack analysis using partial watermark in DCT domainReena Gunjan, Vijay Laxmi, Manoj Singh Gaur. 188-192 [doi]
- A clustering based algorithm for network intrusion detectionK. V. Arya, Hemant Kumar. 193-196 [doi]
- ESCAPE: entropy score analysis of packed executableSmita Naval, Vijay Laxmi, M. S. Gaur, P. Vinod. 197-200 [doi]
- Security by simple network traffic monitoringHiroshi Tsunoda, Glenn Mansfield Keeni. 201-204 [doi]
- Fine tuning the advanced encryption standard (AES)Behnam Rahnama, Atilla Elçi, Ibukun Eweoya. 205-209 [doi]