Abstract is missing.
- Preventive information flow control through a mechanism of split addressesDeepak Subramanian, Guillaume Hiet, Christophe Bidan. 1-8 [doi]
- Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric SystemsKiran B. Raja, Ramachandra Raghavendra, Christoph Busch. 9-15 [doi]
- Efficient Evaluation of Authorizations for Video DataUssama Yakub, Vijayalakshmi Atluri, Jaideep Vaidya. 16-23 [doi]
- Impact of Drug Abuse on Face Recognition Systems: A Preliminary StudyRamachandra Raghavendra, Kiran B. Raja, Christoph Busch. 24-27 [doi]
- Integrating non elementary actions in access control modelsSalem Benferhat, Mouslim Tolba, Karim Tabia, Abdelkader Belkhir. 28-31 [doi]
- A Signature-Based Intrusion Detection System for Web Applications based on Genetic AlgorithmRobert Bronte, Hossain Shahriar, Hisham M. Haddad. 32-39 [doi]
- A Secure Multi-Tenant Framework for SDNHao Jiang, Ahmed Bouabdallah, Amin Aflatoonian, Jean-Marie Bonnin, Karine Guillouard. 40-44 [doi]
- A Study on Unified Security Mechanism and Platform for Centralized Business ContentsYong-pyo Hong, Youngjun Kim. 45-48 [doi]
- Security-enabled Enactment of Decentralized WorkflowsSardar Hussain, Richard O. Sinnott, Ron Poet. 49-56 [doi]
- A New Authentication Scheme for Cloud-based Storage ApplicationsManel Medhioub, Mohamed Hamdi, Tai-Hoon Kim. 57-60 [doi]
- Phishing Susceptibility Detection through Social Media AnalyticsSafwan Alarm, Khalil El-Khatib. 61-64 [doi]
- Applying Virtualization Technology for the Construction of Trusted Executable EnvironmentAndrey Yu. Chernov, Artem S. Konoplev, Dmitry P. Zegzhda. 65-66 [doi]
- Algorithms for network server anomaly behavior detection without traffic content inspectionVladimir Eliseev, Anastasiya Gurina. 67-71 [doi]
- An Attributed Graph Mining Approach to Detect Transfer Pricing FraudAlexey Tselykh, Margarita Knyazeva, Elena Popkova, Antonina Durfee, Alexander Tselykh. 72-75 [doi]
- Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic DetectionGiovanni Bottazzi, Giuseppe F. Italiano, Giuseppe G. Rutigliano. 76-80 [doi]
- Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe RoutingPeter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Alexander I. Pechenkin, Alexander Minin, Daria S. Lavrova. 81-87 [doi]
- Evolutionary Game-Based Defense Mechanism in the MANETsMyria Bouhaddi, Kamel Adi, Mohammed Said Radjef. 88-95 [doi]
- Fuzzy Commitment Scheme based on Reed Solomon CodesSonam Chauhan, Ajay Sharma. 96-99 [doi]
- Modeling of Algebraic Analysis of GOST+ Cipher in SageMathLudmila K. Babenko, Ekaterina Maro, Maxim Anikeev. 100-103 [doi]
- Fast Implementation and Cryptanalysis of GOST R 34.12-2015 Block CiphersEvgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev. 104-111 [doi]
- Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method EnhancementAlexander G. Chefranov, Amir Narimani. 112-115 [doi]
- Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor NetworkAlexandr S. Basan, Elena Basan, Oleg B. Makarevich. 116-122 [doi]
- An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc NetworksJagjot Kaur, Dale Lindskog. 124-128 [doi]
- An Efficient Secure scheme for Wireless Sensor NetworksManel Elleuchi, Omar Cheikhrouhou, Abdulfattah Mohammad Obeid, Mohamed Abid. 129-132 [doi]
- The Improved Protocols Based on AODV in terms of Quality and Security in MANET NetworkMohammadreza Soltan Aghaei, Elham Zamani. 133-135 [doi]
- Biometric Authentication Protocols on Smartphones: An OverviewMartin Stokkenes, Ramachandra Raghavendra, Christoph Busch. 136-140 [doi]
- A Scalable Threats Classification Model in Information SystemsMouna Jouini, Latifa Ben Arfa Rabai. 141-144 [doi]
- An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation ProtocolGoutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo. 145-149 [doi]
- Experimentation of Privacy Protection for JPEG Contents on Image-Sharing PlatformsKun He, Christophe Bidan, Gaëtan Le Guelvouit. 150-157 [doi]
- Privacy-preserving Electronic Road Pricing System for Multifare Low Emission ZonesRoger Jardí-Cedó, Macià Mut Puigserver, Jordi Castellà-Roca, M. Magdalena, Alexandre Viejo. 158-165 [doi]
- Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing UnitsXavier J. A. Bellekens, Greig Paul, Christos Tachtatzis, James Irvine, Robert C. Atkinson. 166-173 [doi]
- A Study of a Smart IT Convergence Framework in IoTHye-Young Kim. 174-175 [doi]
- Criteria and Indices of Computer Network ProtectionVladimir I. Vorobiev, Elena L. Evnevich, Roza Fatkieva, Ludmila N. Fedorchenko, Dmitriy K. Levonevskiy. 176-177 [doi]