Abstract is missing.
- DynFluid: Predicting Time-Evolving Rating in Recommendation Systems via Fluid DynamicsHuanyang Zheng, Jie Wu 0001. 1-8 [doi]
- CloudRec: A Mobile Cloud Service Recommender System Based on Adaptive QoS ManagementWei Tang, Zheng Yan. 9-16 [doi]
- Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID TagsJiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su. 17-24 [doi]
- Trust Evaluation in Mobile Devices: An Empirical StudyRichard Weiss, Leon Reznik, Yanyan Zhuang, Andrew Hoffman, Darrell Pollard, Albert Rafetseder, Tao Li, Justin Cappos. 25-32 [doi]
- Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factorJiaojiao Song, Xiaohong Li, Jing Hu, Guangquan Xu, Zhiyong Feng. 33-40 [doi]
- TrustTokenF: A Generic Security Framework for Mobile Two-Factor Authentication Using TrustZoneYingjun Zhang, Shijun Zhao, Yu Qin, Bo Yang, Dengguo Feng. 41-48 [doi]
- On Rehoming the Electronic ID to TEEsSandeep Tamrakar, Jan-Erik Ekberg, Pekka Laitinen. 49-56 [doi]
- Trusted Execution Environment: What It is, and What It is NotMohamed Sabt, Mohammed Achemlal, Abdelmadjid Bouabdallah. 57-64 [doi]
- JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG InterfaceMordechai Guri, Yuri Poliak, Bracha Shapira, Yuval Elovici. 65-73 [doi]
- Performance of Cooperative Firewalls in Real-World DeploymentsNishant Patanaik, Ana Goulart. 74-81 [doi]
- Memory Attestation of Wireless Sensor Nodes by Trusted Local AgentsPo-Hung Yang, Sung-Ming Yen. 82-89 [doi]
- Mobility Increases the Risk of Malware Propagations in Wireless NetworksBo Liu, Wanlei Zhou, Longxiang Gao, Sheng Wen, Tom H. Luan. 90-95 [doi]
- Simmelian Ties and Structural Holes: Exploring Their Topological Roles in Forming Trust for Securing Wireless Sensor NetworksMing Xiang, William Liu, Quan Bai, Adnan Al-Anbuky. 96-103 [doi]
- Cooperative Transmission Against Impersonation Attack Using Inter-Session Interference in Two-Hop Wireless NetworksWeidong Yang, Le Xiao, Limin Sun, Qing Li. 104-110 [doi]
- Reputation Propagation and Updating in Mobile Ad Hoc Networks with Byzantine FailuresChuanyou Li, Michel Hurfin, Yun Wang. 111-118 [doi]
- Contextual Sub-network Extraction in Contextual Social NetworksXiaoming Zheng, Yan Wang, Mehmet A. Orgun. 119-126 [doi]
- Trust-Based Formal Delegation Framework for Enterprise Social NetworksAhmed Bouchami, Olivier Perrin, Ehtesham Zahoor. 127-134 [doi]
- Trust-Aware Elastic Social Compute UnitsMirela Riveni, Hong Linh Truong, Schahram Dustdar. 135-142 [doi]
- Regenerating-Codes-Based Efficient Remote Data Checking and Repairing in Cloud StorageJing Chen, Yuling Peng, RuiYing Du, Quan Yuan, Minghui Zheng. 143-150 [doi]
- Research on Key Management for Multi-privileged Group CommunicationsWei Zhou, Yang Xu, Guojun Wang. 151-158 [doi]
- Attainable Unconditional Security for Shared-Key CryptosystemsFabrizio Biondi, Thomas Given-Wilson, Axel Legay. 159-166 [doi]
- Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateabilityKeita Emura, Le Trieu Phong, Yohei Watanabe. 167-174 [doi]
- RFID Secure Application Revocation for IoT in 5GKai Fan, Yuanyuan Gong, Zhao Du, Hui Li, Yintang Yang. 175-181 [doi]
- Identifying Unknown Android Malware with Feature Extractions and Classification TechniquesLudovic Apvrille, Axelle Apvrille. 182-189 [doi]
- Loop-Oriented Programming: A New Code Reuse Attack to Bypass Modern DefensesBingchen Lan, Yan Li, Hao Sun, Chao Su, Yao Liu, Qingkai Zeng. 190-197 [doi]
- Efficient Detection of Zero-day Android Malware Using Normalized Bernoulli Naive BayesLuiza Sayfullina, Emil Eirola, Dmitry Komashinsky, Paolo Palumbo, Yoan Miché, Amaury Lendasse, Juha Karhunen. 198-205 [doi]
- A First Look at Android Malware Traffic in First Few MinutesZhenxiang Chen, Hongbo Han, Qiben Yan, Bo Yang, Lizhi Peng, Lei Zhang, Jin Li. 206-213 [doi]
- Fast Identification of Obfuscation and Mobile Advertising in Mobile MalwareMarián Kühnel, Manfred Smieschek, Ulrike Meyer. 214-221 [doi]
- Secure Block Device - Secure, Flexible, and Efficient Data Storage for ARM TrustZone SystemsDaniel Hein, Johannes Winter, Andreas Fitzek. 222-229 [doi]
- A Fault-Tolerant Watermarking Algorithm for FPGA IP ProtectionJing Long, Dafang Zhang, Wei Liang, Wenwei Li. 230-237 [doi]
- Big Data Analytics for Detecting Host Misbehavior in Large LogsDaniel Goncalves, Joao Bota, Miguel Correia. 238-245 [doi]
- DPBSV - An Efficient and Secure Scheme for Big Sensing Data StreamDeepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen. 246-253 [doi]
- Interplay of Security&Dependability and Resource Using Model-Driven and Pattern-Based DevelopmentBrahim Hamid. 254-262 [doi]
- RPAH: Random Port and Address Hopping for Thwarting Internal and External AdversariesYue-Bin Luo, Baosheng Wang, Xiaofeng Wang, Xiao-Feng Hu, Gui-Lin Cai, Hao Sun. 263-270 [doi]
- MimicHunter: A General Passive Network Protocol Mimicry Detection FrameworkZigang Cao, Gang Xiong, Li Guo. 271-278 [doi]
- An Analysis of TLS Handshake ProxyingDouglas Stebila, Nick Sullivan. 279-286 [doi]
- How to Misuse SMTP over TLS: A Study of the (In) Security of Email Server CommunicationLars Baumgärtner, Jonas Hochst, Matthias Leinweber, Bernd Freisleben. 287-294 [doi]
- Unsupervised Feature Selection Method for Intrusion Detection SystemMohammed A. Ambusaidi, Xiangjian He, Priyadarsi Nanda. 295-301 [doi]
- Identifying Diffusion Sources in Large Networks: A Community Structure Based ApproachJiao Jiao Jiang, Andi Zhou, Kasra Majbouri Yazdi, Sheng Wen, Shui Yu, Yang Xiang. 302-309 [doi]
- An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined NetworkingRui Wang, Zhiping Jia, Lei Ju. 310-317 [doi]
- A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical NetworkMian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu. 318-325 [doi]
- Surveys of Daily Information Security of Citizens in FinlandJukka A. Koskinen. 326-333 [doi]
- Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior PredictionIsmail Adel Al-Taharwa, Hahn-Ming Lee, Albert B. Jeng, Cheng-Seen Ho, Kuo-Ping Wu, Shyi-Ming Chen. 334-343 [doi]
- Diversifying SQL to Prevent Injection AttacksSampsa Rauti, Jukka Teuhola, Ville Leppänen. 344-351 [doi]
- Information Security Awareness in Educational Institution: An Analysis of Students' Individual FactorsAli Farooq, Johanna Isoaho, Seppo Virtanen, Jouni Isoaho. 352-359 [doi]
- A Hybrid Mobile Authentication Model for Ubiquitous NetworkingAbdullah M. Almuhaideb, Bala Srinivasan, Phu Dung Le, Mohammed A. Alhabeeb, Waleed Alfehaid. 360-367 [doi]
- Integrity Protection of NDEF Message with Flexible and Enhanced NFC Signature RecordsSufian Hameed, Usman Murad Jamali, Adnan Samad. 368-375 [doi]
- An Instruction-Set Randomization Using Length-Preserving PermutationJianming Fu, Xu Zhang, Yan Lin. 376-383 [doi]
- Cut-and-Choose Bilateral Oblivious Transfer and Its ApplicationChuan Zhao, Han Jiang, Xiaochao Wei, Qiuliang Xu, Minghao Zhao. 384-391 [doi]
- A Family of Scalable Polynomial Multiplier Architectures for Lattice-Based CryptographyChaohui Du, Guoqiang Bai. 392-399 [doi]
- Open-TEE - An Open Virtual Trusted Execution EnvironmentBrian McGillion, Tanel Dettenborn, Thomas Nyman, N. Asokan. 400-407 [doi]
- Transparent Page-Based Kernel and User Space Execution Tracing from a Custom Minimal ARM HypervisorJulian Horsch, Sascha Wessel. 408-417 [doi]
- NIST CyberSecurity Framework Compliance: A Generic Model for Dynamic Assessment and Predictive RequirementsNuno Teodoro, Luis Goncalves, Carlos Serrão. 418-425 [doi]
- A Joint Optimization Approach to Security-as-a-Service Allocation and Cyber Insurance ManagementSivadon Chaisiri, Ryan K. L. Ko, Dusit Niyato. 426-433 [doi]
- Efficient Integrity Auditing for Shared Data in the Cloud with Secure User RevocationYuchuan Luo, Ming Xu, Shaojing Fu, Dongsheng Wang, Junquan Deng. 434-442 [doi]
- Secure Out-of-Band Remote Management Using Encrypted Virtual Serial Consoles in IaaS CloudsKenichi Kourai, Tatuya Kajiwara. 443-450 [doi]
- Efficient Searchable Symmetric Encryption for Storing Multiple Source Data on CloudChang Liu, Liehuang Zhu, Jinjun Chen. 451-458 [doi]
- Achieving Lightweight and Secure Access Control in Multi-authority CloudYanchao Wang, FengHua Li, Jinbo Xiong, Ben Niu, Fangfang Shan. 459-466 [doi]
- Lightweight Certificateless and Provably-Secure Signcryptosystem for the Internet of ThingsKim Thuat Nguyen, Nouha Oualha, Maryline Laurent. 467-474 [doi]
- Performance Evaluation in WSNs Based on Max-Plus and Time-Domain Stochastic Network CalculusGuowei Wu, Jie Wang, Lin Yao. 475-482 [doi]
- Feature Interaction Problems in Smart Cards with Dynamic Application Lifecycle and Their CountermeasuresRaja Naeem Akram, Konstantinos Markantonakis, Damien Sauveron, Keith Mayes. 483-490 [doi]
- On Using a Von Neumann Extractor in Heart-Beat-Based SecurityRobert Mark Seepers, Christos Strydis, Ioannis Sourdis, Chris Innocentius De Zeeuw. 491-498 [doi]
- WiGen: Breaking the Privacy and Security Barriers for Group Management in RFID SystemsLi Lu, Muhammad Jawad Hussain, Hongzi Zhu. 499-506 [doi]
- Effects of Contextual Properties on Users' Privacy Preferences in Mobile Computing EnvironmentsSeung-Hyun Kim, Han-Gyu Ko, In-Young Ko, Daeseon Choi. 507-514 [doi]
- Private Membership Test for Bloom FiltersTommi Meskanen, Jian Liu, Sara Ramezanian, Valtteri Niemi. 515-522 [doi]
- You are AIRing too Much: Assessing the Privacy of Users in Crowdsourcing Environmental DataJulien Mineraud, Federico Lancerin, Sasitharan Balasubramaniam, Mauro Conti, Sasu Tarkoma. 523-530 [doi]
- A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor NetworksMatthew Bradbury, Matthew Leeke, Arshad Jhumka. 531-538 [doi]
- Time Distortion Anonymization for the Publication of Mobility Data with High UtilityVincent Primault, Sonia Ben Mokhtar, Cédric Lauradoux, Lionel Brunie. 539-546 [doi]
- Aligning the Conflicting Needs of Privacy, Malware Detection and Network ProtectionIan Oliver, Silke Holtmanns. 547-554 [doi]
- Enable Privacy Preservation and Result Verification for Top-k Query in Two-Tiered Sensor NetworksHui Peng, Xiaoying Zhang, Hong Chen, Yuncheng Wu, Yao Wu, Juru Zeng. 555-562 [doi]
- Bin Encoding: A User-Centric Secure Full-Text Searching Scheme for the CloudMark A. Will, Ryan K. L. Ko, Ian H. Witten. 563-570 [doi]
- PEAS: Private, Efficient and Accurate Web SearchAlbin Petit, Thomas Cerqueus, Sonia Ben Mokhtar, Lionel Brunie, Harald Kosch. 571-580 [doi]
- Privacy-Preserving Mining of Frequent Routes in Cellular Network DataOlof Görnerup, Nima Dokoohaki, Andrea Hess. 581-587 [doi]
- uCentive: An Efficient, Anonymous and Unlinkable Incentives SchemeMilica Milutinovic, Italo Dacosta, Andreas Put, Bart De Decker. 588-595 [doi]
- q)-diversity for Anonymizing Sensitive Quasi-IdentifiersYuichi Sei, Takao Takenouchi, Akihiko Ohsuga. 596-603 [doi]
- Lightweight Privacy-Preserving Authentication Scheme for V2G Networks in the Smart GridNeetesh Saxena, Bong-Jun Choi, Shinyoung Cho. 604-611 [doi]
- A Set of Efficient Privacy Protection Enforcing Lightweight Authentication Protocols for Low-Cost RFID TagsPierre-François Bonnefoi, Pierre Dusart, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis. 612-620 [doi]
- Group Sparsity Tensor Factorization for De-anonymization of Mobility TracesTakao Murakami, Atsunori Kanemura, Hideitsu Hino. 621-629 [doi]
- Provenance-Based Attestation for Trustworthy ComputingJiun Yi Yap, Allan Tomlinson. 630-637 [doi]
- A Framework for Evaluating the End-to-End TrustworthinessNazila Gol Mohammadi, Torsten Bandyszak, Costas Kalogiros, Michalis Kanakakis, Thorsten Weyer. 638-645 [doi]
- Trusted Tamper-Evident Data ProvenanceMohammad M. Bany Taha, Sivadon Chaisiri, Ryan K. L. Ko. 646-653 [doi]
- Countermeasure Security Risks Management in the Internet of Things Based on Fuzzy Logic InferenceIgor V. Kotenko, Igor Saenko, Sergey Ageev. 654-659 [doi]
- Trust Metrics Based on a Trusted Network ElementJouni Hiltunen, Jarkko Kuusijärvi. 660-667 [doi]
- Trustworthiness Measurement of E-commerce Systems Using Fuzzy Hybrid Multi-criteria AnalysisZhengping Wu, Lifeng Wang. 668-675 [doi]
- Formal Modeling and Verification of Opportunity-enabled Risk ManagementAlessandro Aldini, Jean-Marc Seigneur, Carlos Ballester Lafuente, Xavier Titi, Jonathan Guislain. 676-684 [doi]
- Single and Multi-metric Trust Management Frameworks for Use in Underwater Autonomous NetworksAndrew Bolster, Alan Marshall. 685-693 [doi]
- RLTE: A Reinforcement Learning Based Trust Establishment ModelAbdullah Aref, Thomas Tran. 694-701 [doi]
- In Certificates We Trust - RevisitedFlorian Reimair, Peter Teufl, Bernd Prunster. 702-709 [doi]
- Interest Flow Control Method Based on User Reputation and Content Name Prefixes in Named Data NetworkingSayaka Umeda, Takashi Kamimoto, Yuri Ohata, Hiroshi Shigeno. 710-717 [doi]
- Adaptive Trust Threshold Strategy for Misbehaving Node Detection and IsolationMuhammad Saleem Khan, Daniele Midi, Majid Iqbal Khan, Elisa Bertino. 718-725 [doi]
- Trust-Aware Review Spam DetectionHao Xue, FengJun Li, Hyunjin Seo, Roseann Pluretti. 726-733 [doi]
- KDet: Coordinated Detection of Forwarding Faults in Wireless Community NetworksEster López, Leandro Navarro. 734-741 [doi]
- Inferring User Actions from Provenance LogsXin Li, Chaitanya Joshi, Alan Yu Shyang Tan, Ryan Kok Leong Ko. 742-749 [doi]
- Data Mobility Management Model for Active Data CubesThanh Dat Dang, Doan B. Hoang, Priyadarsi Nanda. 750-757 [doi]
- BotProfiler: Profiling Variability of Substrings in HTTP Requests to Detect Malware-Infected HostsDaiki Chiba, Takeshi Yagi, Mitsuaki Akiyama, Kazufumi Aoki, Takeo Hariu, Shigeki Goto. 758-765 [doi]
- Analysis of Mobility Algorithms for Forensic Virtual Machine Based Malware DetectionNada Alruhaily, Behzad Bordbar, Tom Chothia. 766-773 [doi]
- A Novel Architecture for Predictive CyberSecurity Using Non-homogenous Markov ModelsSubil Abraham, Suku Nair. 774-781 [doi]
- eSKAMI: Efficient and Scalable Multi-group Key Management for Advanced Metering Infrastructure in Smart GridMourad Benmalek, Yacine Challal. 782-789 [doi]
- Implementing Authentication Systems Based on Physical Unclonable FunctionsJohn Ross Wallrabenstein. 790-796 [doi]
- Save Our PasswordsMartin Boonk, Ronald Petrlic, Christoph Sorge. 797-800 [doi]
- Partial Data Protection via Structure-Preserving Document PartitioningLuigi Lo Iacono. 801-807 [doi]
- Enhancing EMV Online PIN VerificationDanushka Jayasinghe, Raja Naeem Akram, Konstantinos Markantonakis, Konstantinos Rantos, Keith Mayes. 808-817 [doi]
- A Formalization of Fingerprinting TechniquesFabian Lanze, Andriy Panchenko, Thomas Engel. 818-825 [doi]
- Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular ConnectivityAleksandr Ometov, Konstantin Zhidanov, Sergey Bezzateev, Roman Florea, Sergey D. Andreev, Yevgeni Koucheryavy. 826-833 [doi]
- A Secure Northbound Interface for SDN ApplicationsChristian Banse, Sathyanarayanan Rangarajan. 834-839 [doi]
- Secure Routing Protocol Considering Load Distribution in Mobile Ad Hoc NetworksYuri Ohata, Sayaka Umeda, Takashi Kamimoto, Hiroshi Shigeno. 840-847 [doi]
- A Study of IEEE 802.15.6 Association ProtocolsJing Feng, Xin Huang, Yulin Lu, Ruiyang Xu, Zheng Yan. 848-855 [doi]
- Access Control for the Cloud Based on Multi-device AuthenticationLorena González-Manzano, José María de Fuentes, Agustín Orfila. 856-863 [doi]
- Enhancing Access-Control with Risk-Metrics for Collaboration on Social Cloud-PlatformsAhmed Bouchami, Elio Goettelmann, Olivier Perrin, Claude Godart. 864-871 [doi]
- RESCUE: Resilient Secret Sharing Cloud-Based ArchitectureElochukwu Ukwandu, William J. Buchanan, Lu Fan, Gordon Russell, Owen Lo. 872-879 [doi]
- On the Resource Consumption of Secure Data SharingHolger Kühner, Hannes Hartenstein. 880-889 [doi]
- Secure Location Validation with Wi-Fi Geo-fencing and NFCMaksim Avdyushkin, Musfiq Rahman. 890-896 [doi]
- Proofs of Encrypted Data Retrievability with Probabilistic and Homomorphic Message AuthenticatorsDongxi Liu, John Zic. 897-904 [doi]
- A Scalable Data Hiding Scheme Using Hilbert Space Curve and ChaosGyan Singh Yadav, Aparajita Ojha. 905-909 [doi]
- Detecting Data Semantic: A Data Leakage Prevention ApproachSultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy. 910-917 [doi]
- A New Solution Based on Multi-rate LDPC for Flash Memory to Reduce ECC RedundancyShigui Qi, Dan Feng, Nan Su, Wenguo Liu, Jingning Liu. 918-923 [doi]
- CaptureMe: Attacking the User Credential in Mobile Banking ApplicationsMohamed Ali El-Serngawy, Chamseddine Talhi. 924-933 [doi]
- Watch Your Mobile Payment: An Empirical Study of Privacy DisclosureZakaria Sahnoune, Esma Aïmeur, Ghada El Haddad, Rodrigue Sokoudjou. 934-941 [doi]
- Disequilibrium: Tor's Exit Node Selection under the StereoscopeRobert Koch 0002, Mario Golling, Gabi Dreo Rodosek. 942-949 [doi]
- Extended Model of Side-Information in GarblingTommi Meskanen, Valtteri Niemi, Noora Nieminen. 950-957 [doi]
- A Cloud-Based Model to Facilitate Mobility of Privacy-Preserving Attribute-Based Credential UsersAhmad Sabouri. 958-965 [doi]
- Can On-line Social Network Users Trust That What They Designated as Confidential Data Remains So?Vladimir Estivill-Castro, David F. Nettleton. 966-973 [doi]
- Stylometric Anonymity: Is Imitation the Best Strategy?Mahmoud Khonji, Youssef Iraqi. 974-982 [doi]
- k-anonymity: Risks and the RealityAnirban Basu, Toru Nakamura, Seira Hidano, Shinsaku Kiyomoto. 983-989 [doi]
- A Dynamic Credible Factory Reset Mechanism of Personal Data in Android DeviceDali Zhu, Zheming Fan, Na Pang. 990-998 [doi]
- The Pseudonym Broker Privacy Pattern in Medical Data CollectionChristiaan Hillen. 999-1005 [doi]
- Game-Theoretic Model of Incentivizing Privacy-Aware Users to Consent to Location TrackingEmmanouil A. Panaousis, Aron Laszka, Johannes Pohl, Andreas Noack, Tansu Alpcan. 1006-1013 [doi]
- DroidCIA: A Novel Detection Method of Code Injection Attacks on HTML5-Based Mobile AppsYen-Lin Chen, Hahn-Ming Lee, Albert B. Jeng, Te-En Wei. 1014-1021 [doi]
- Secure Two-Party Rank Correlation Computations for Recommender SystemsKok Seng Wong, Minjie Seo, Myung Ho Kim. 1022-1028 [doi]
- The Role of Risk Perceptions in Privacy Concerns EvaluationAnna Rohunen, Jouni Markkula. 1029-1036 [doi]
- A Language for the Composition of Privacy-Enforcement TechniquesRonan-Alexandre Cherrueau, Rémi Douence, Mario Südholt. 1037-1044 [doi]
- Potential Mass Surveillance and Privacy Violations in Proximity-Based Social ApplicationsSilvia Puglisi, David Rebollo-Monedero, Jordi Forné. 1045-1052 [doi]
- A Review of Free Cloud-Based Anti-Malware Apps for AndroidJason Walls, Kim-Kwang Raymond Choo. 1053-1058 [doi]
- Forensic Collection and Analysis of Thumbnails in AndroidMing Di Leom, Christian Javier D'Orazio, Gaye Deegan, Kim-Kwang Raymond Choo. 1059-1066 [doi]
- EyeCloud: A BotCloud Detection SystemMohammad Reza Memarian, Mauro Conti, Ville Leppänen. 1067-1072 [doi]
- A Taxonomy of Cloud Attack Consequences and Mitigation Strategies: The Role of Access Control and Privileged Access ManagementKin Suntana Tep, Ben Martini, Ray Hunt, Kim-Kwang Raymond Choo. 1073-1080 [doi]
- Cloud Security Audit for Migration and Continuous MonitoringUmar Mukhtar Ismail, Shareeful Islam, Haralambos Mouratidis. 1081-1087 [doi]
- Enhancing Cloud Security and Privacy: Broadening the Service Level AgreementBob Duncan, Mark Whittington. 1088-1093 [doi]
- Android Cache Taxonomy and Forensic ProcessFelix Immanuel, Ben Martini, Kim-Kwang Raymond Choo. 1094-1101 [doi]
- Secure Sketch Search for Document SimilarityCengiz Örencik, Mahmoud Alewiwi, Erkay Savas. 1102-1107 [doi]
- Architectural Model and Security Mechanisms for Cloud FederationsLuciano Barreto, Joni da Silva Fraga, Frank Siqueira. 1108-1115 [doi]
- A Framework for Cryptography Based Accountability and Service Invocation Control for Service Composition in a Multicloud ArchitectureGwan-Hwan Hwang, Kuh-Yih Huang, Yu-Cheng Hsiao. 1116-1121 [doi]
- Stationarity Enforcement of Accelerator Based TRNG by Genetic AlgorithmJose Juan Mijares Chan, Parimala Thulasiraman, Gabriel Thomas, Ruppa K. Thulasiram. 1122-1128 [doi]
- A Global, Empirical Analysis of the Shellshock Vulnerability in Web ApplicationsBaden Delamore, Ryan K. L. Ko. 1129-1135 [doi]
- Preventing Library Spoofing on AndroidDennis Titze, Julian Schütte. 1136-1141 [doi]
- Issues in Trustworthy Software SystemsMazen Ezzeddine, Haitham Akkary. 1142-1147 [doi]
- Mission-Aware Vulnerability Assessment for Cyber-Physical SystemsXiaotian Wang, Matthew Davis, Junjie Zhang, Vance Saunders. 1148-1153 [doi]
- Alias Detection Across Multi-online Applications Based on User's Behavior CharacteristicsZhaoli Liu, Tao Qin, Xiaohong Guan, Xiaoqiang Niu, Tao Yang. 1154-1159 [doi]
- A Rejuvenation Model for Software System under Normal AttackHaining Meng, Xinhong Hei, Yan Li, Yanning Du, Guo Xie 0001. 1160-1164 [doi]
- Towards 5G SecurityPeter Schneider, Günther Horn. 1165-1170 [doi]
- Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR AccessSiddharth Prakash Rao, Silke Holtmanns, Ian Oliver, Tuomas Aura. 1171-1176 [doi]
- Mobile Guard Demo: Network Based Malware DetectionVikramajeet Khatri, Joerg Abendroth. 1177-1179 [doi]
- Towards Secure Multi-tenant Virtualized NetworksNicolae Paladi, Christian Gehrmann. 1180-1185 [doi]
- CRC-Based Message Authentication for 5G Mobile TechnologyElena Dubrova, Mats Näslund, Göran Selander. 1186-1191 [doi]
- An Air Interface Signaling Protection Function for Mobile Networks: GSM Experiments and BeyondPrajwol Kumar Nakarmi, Oscar Ohlsson, Michael Liljenstam. 1192-1198 [doi]
- Security in D2D Communications: A ReviewMingjun Wang, Zheng Yan. 1199-1204 [doi]
- A USIM Compatible 5G AKA Protocol with Perfect Forward SecrecyJari Arkko, Karl Norrman, Mats Näslund, Bengt Sahlin. 1205-1209 [doi]
- Revocation Management in Vehicular Ad-hoc NetworksFrancisco Martín-Fernández, Pino Caballero-Gil, Cándido Caballero-Gil. 1210-1217 [doi]
- Enhancing the Trajectory Privacy with Laplace MechanismDaiyong Quan, Lihua Yin, Yunchuan Guo. 1218-1223 [doi]
- A Simple RFID-Based Architecture for Privacy PreservationDi Wu, Jingfu Du, Dali Zhu, Siye Wang. 1224-1229 [doi]
- Towards Efficient Implementation of Lattice-Based Public-Key Encryption on Modern CPUsChaohui Du, Guoqiang Bai, Hongyi Chen. 1230-1236 [doi]
- Towards Tracing of k-Anonymized DatasetsShinsaku Kiyomoto, Toru Nakamura, Yutaka Miyake. 1237-1242 [doi]
- WAVE: Secure Wireless Pairing Exploiting Human Body MovementsWei Wang, Zhan Wang, Wen Tao Zhu, Lei Wang. 1243-1248 [doi]
- Achieving Forward Secrecy and Unlinkability in Cloud-Based Personal Health Record SystemNaveen Kumar 0011, Anish Mathuria, Manik Lal Das. 1249-1254 [doi]
- Security Orchestrator: Introducing a Security Orchestrator in the Context of the ETSI NFV Reference ArchitectureBernd Jäger. 1255-1260 [doi]
- A Trustworthiness Model for Crowdsourced and Crowdsensed DataCatia Prandi, Stefano Ferretti, Silvia Mirri, Paola Salomoni. 1261-1266 [doi]
- Periodicity-and-Linear-Based Data Suppression Mechanism for WSNYanchao Song, Juan Luo, Chang Liu, Wenfeng He. 1267-1271 [doi]
- Quantitative Trustworthy Evaluation Scheme for Trust Routing Scheme in Wireless Sensor NetworksHongsong Chen, Zhi Han, Zhongchuan Fu. 1272-1278 [doi]
- An Energy Efficient Congestion Control Scheme for Multimedia Data in Wireless Sensor NetworksKyoungsoo Bok, Eunkyung Ryu, Junho Park, Jaesoo Yoo. 1279-1283 [doi]
- A Security Topology Protocol of Wireless Sensor Networks Based on Community Detection and Energy AwareZuo Chen, Mengyuan Jia, Yan Wang, Xiaolong Yan. 1284-1291 [doi]
- A Novel Sensor Deployment Approach Using Fruit Fly Optimization Algorithm in Wireless Sensor NetworksHuan Zhao, Qian Zhang, Liang Zhang, Yan Wang. 1292-1297 [doi]
- A Self-Adaptive Wireless Sensor Network Coverage Method for Intrusion Tolerance Based on Particle Swarm Optimization and Cuckoo SearchZuo Chen, Xue Li, Bin Lv, Mengyuan Jia. 1298-1305 [doi]
- Protein-Protein Interaction Network Constructing Based on Text Mining and Reinforcement Learning with Application to Prostate CancerFei Zhu, Quan Liu, Xiaofang Zhang, Bairong Shen. 1306-1311 [doi]
- Study on the Coverage of Adaptive Wireless Sensor Network Based on TrustHuan Zhao, Chaoming Hu, Rui Zheng, Bin Lv. 1312-1317 [doi]
- An Efficient Clustering Mining Algorithm for Indoor Moving Target Trajectory Based on the Improved AGNESWeiqing Huang, Chang Ding, Siye Wang, Shuang Hu. 1318-1323 [doi]
- A Near Field Communication(NFC) Security Model Based on OSI Reference ModelWei Fan, Wei-qing Huang, Zhujun Zhang, Ye Wang, Degang Sun. 1324-1328 [doi]
- Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple SignersKenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara. 1329-1336 [doi]
- A Method for Deriving and Testing Malicious Behavior Detection RulesRaimo Hilden, Kimmo Hätönen. 1337-1342 [doi]
- Towards a Generic Trust Management Framework Using a Machine-Learning-Based Trust ModelJorge López, Stephane Maag. 1343-1348 [doi]
- A Distributed Reputation System for Certification Authority Trust ManagementJiska Classen, Johannes Braun 0001, Florian Volk, Matthias Hollick, Johannes A. Buchmann, Max Mühlhäuser. 1349-1356 [doi]
- Data Sharing on the Cloud: A Scalable Proxy-Based Protocol for Privacy-Preserving QueriesMaryam Sepehri, Stelvio Cimato, Ernesto Damiani, Chan Yeob Yeuny. 1357-1362 [doi]
- DDOS Mitigation Cloud-Based ServiceFouad Amine Guenane, Michele Nogueira Lima, Ahmed Serhrouchni. 1363-1368 [doi]
- Dynamic Game Access Control Based on TrustShunan Ma. 1369-1373 [doi]
- Dynamic Security Policies Enforcement and Adaptation Using AspectsMuhammad Sabir Idrees, Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens. 1374-1379 [doi]
- Cybercrime Profiling: Decision-Tree Induction, Examining Perceptions of Internet Risk and Cybercrime VictimisationAmeer Al-Nemrat, Chafika Benzaid. 1380-1385 [doi]
- From ZeuS to Zitmo: Trends in Banking MalwareNajla Etaher, George R. S. Weir, Mamoun Alazab. 1386-1391 [doi]
- ARP Cache Poisoning Mitigation and Forensics InvestigationHeman Awang Mangut, Ameer Al-Nemrat, Chafika Benzaid, Abdel-Rahman H. Tawil. 1392-1397 [doi]
- Virtualization and Cyber Security: Arming Future Security PractitionersMidhun Babu Tharayanil, Gill Whitney, Mahdi Aiash, Chafika Benzaid. 1398-1402 [doi]
- A Security Analysis of the Emerging P2P-Based Personal Cloud Platform MaidSafeFlorian Jacob, Jens Mittag, Hannes Hartenstein. 1403-1410 [doi]
- Automated Collection and Analysis of Malware Disseminated via Online AdvertisingMuhammad N. Sakib, Chin-Tser Huang. 1411-1416 [doi]