Abstract is missing.
- Classification of Landing and Distribution Domains Using Whois' Text MiningTran Phuong Thao, Akira Yamada, Kosuke Murakami, Jumpei Urakawa, Yukiko Sawaya, Ayumu Kubota. 1-8 [doi]
- Evolution of Publicly Disclosed Information in Facebook ProfilesReza Farahbakhsh, Samin Mohammadi, Xiao Han, Ángel Cuevas, Noël Crespi. 9-16 [doi]
- Practical Application-Level Dynamic Taint Analysis of Android AppsJulian Schütte, Alexander Kuechler, Dennis Titze. 17-24 [doi]
- Authenticating Compromisable Storage SystemsJiangshan Yu, Mark Ryan, Liqun Chen. 25-32 [doi]
- Immediate Attribute Revocation in Decentralized Attribute-Based Encryption Access ControlYoucef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah. 33-40 [doi]
- On the Effectiveness of Ambient Sensing for Detecting NFC Relay AttacksIakovos Gurulian, Carlton Shepherd, Eibe Frank, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes. 41-49 [doi]
- WENC: HTTPS Encrypted Traffic Classification Using Weighted Ensemble Learning and Markov ChainWubin Pan, Guang Cheng, Yongning Tang. 50-57 [doi]
- Pseudo Anonymous and Hidden Attribute Comparison Based on Quick Friend Matching in Mobile Social NetworksEntao Luo, Guojun Wang, Qin Liu. 58-64 [doi]
- A Distinction Method of Flooding DDoS and Flash Crowds Based on User Traffic BehaviorDegang Sun, Kun Yang, Zhixin Shi, Yan Wang. 65-72 [doi]
- Based on Multi-features and Clustering Ensemble Method for Automatic Malware CategorizationYunan Zhang, Chenghao Rong, Qingjia Huang, Yang Wu, Zeming Yang, Jianguo Jiang. 73-82 [doi]
- Detection of Single Event Transients Based on Compressed SensingCuiping Shao, Huiyun Li. 83-88 [doi]
- A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless NetworksQianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Liu Liu. 89-95 [doi]
- Securing the Neighbour Discovery Protocol in IPv6 State-ful Address Auto-ConfigurationNadeem Ahmed, Adeel Sadiq, Anum Farooq, Rabia Akram. 96-103 [doi]
- A Public Key Encryption Scheme for String IdentificationIndranil Ghosh Ray, Muttukrishnan Rajarajan. 104-111 [doi]
- Insider Threat Detection Through Attributed Graph ClusteringAnagi Gamachchi, Serdar Boztas. 112-119 [doi]
- Malware Discrimination Based on Reversed Association TaskLansheng Han, Shuxia Han, Wenjing Jia, Changhua Sun, Cai Fu. 120-127 [doi]
- Fine-Grained Fingerprinting Threats to Software-Defined NetworksMinjian Zhang, Jianwei Hou, Ziqi Zhang, Wenchang Shi, Bo Qin, Bin Liang. 128-135 [doi]
- SimiDroid: Identifying and Explaining Similarities in Android AppsLi Li 0029, Tegawendé F. Bissyandé, Jacques Klein. 136-143 [doi]
- A Self-healing Key Pre-distribution Scheme for Multi-phase Wireless Sensor NetworksMohamed-Lamine Messai, Hamida Seba. 144-151 [doi]
- TransCrypt: Transparent Main Memory Encryption Using a Minimal ARM HypervisorJulian Horsch, Manuel Huber 0001, Sascha Wessel. 152-161 [doi]
- On Designing Collusion-Resistant Incentive Mechanisms for Mobile Crowdsensing SystemsShiyu Ji, Tingting Chen. 162-169 [doi]
- A Lightweight Anonymous Mutual Authentication with Key Agreement Protocol on ECCWei Zhang 0031, Dongdai Lin, Hailong Zhang 0001, Cong Chen, Xiaojun Zhou. 170-176 [doi]
- CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud ManagementWeizhong Qiang, Gongping Xu, Guozhong Sun, Tianqing Zhu, Hai Jin. 177-184 [doi]
- Distributed Configuration, Authorization and Management in the Cloud-Based Internet of ThingsMartin Henze, Benedikt Wolters, Roman Matzutt, Torsten Zimmermann, Klaus Wehrle. 185-192 [doi]
- CSCdroid: Accurately Detect Android Malware via Contribution-Level-Based System Call CategorizationShaofeng Zhang, Xi Xiao. 193-200 [doi]
- Secure and Light Weight Fine-grained Access Mechanism for Outsourced DataMosarrat Jahan, Partha Sarathi Roy 0001, Kouichi Sakurai, Aruna Seneviratne, Sanjay Jha. 201-209 [doi]
- Viability of Using Shadows Cast by Vehicles for Position Verification in Vehicle PlatooningTasnuva Tithi, Chris Winstead, Ryan M. Gerdes. 210-217 [doi]
- FEPDF: A Robust Feature Extractor for Malicious PDF DetectionMin Li, Yunzheng Liu, Min Yu, Gang Li, Yongjian Wang, Chao Liu. 218-224 [doi]
- Discovering Malicious Domains through Alias-Canonical GraphChengwei Peng, Xiaochun Yun, Yongzheng Zhang 0002, Shuhao Li, Jun Xiao. 225-232 [doi]
- A Passive Client-based Approach to Detect Evil Twin AttacksQian Lu, Haipeng Qu, Yuan Zhuang, Xi Jun Lin, Yanyong Zhu, Yunzheng Liu. 233-239 [doi]
- T2Droid: A TrustZone-Based Dynamic Analyser for Android ApplicationsSileshi Demesie Yalew, Gerald Q. Maguire Jr., Seif Haridi, Miguel Correia. 240-247 [doi]
- Hidden-Token Searchable Public-Key EncryptionCong Zuo, Jun Shao, Zhe Liu, Yun Ling, Guiyi Wei. 248-254 [doi]
- A High-Speed and SPA-Resistant Implementation of ECC Point Multiplication Over GF(p)Xiang Feng, Shuguo Li. 255-260 [doi]
- SEEAD: A Semantic-Based Approach for Automatic Binary Code De-obfuscationZhanyong Tang, Kaiyuan Kuang, Lei Wang, Chao Xue, Xiaoqing Gong, XiaoJiang Chen, Dingyi Fang, Jie Liu, Zheng Wang. 261-268 [doi]
- Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh NetworksAshish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, Deepak Puthal. 269-276 [doi]
- Evaluating the Effectiveness of Security Metrics for Dynamic NetworksSimon Enoch Yusuf, Mengmeng Ge, Jin B. Hong, Hani Alzaid, Dong Seong Kim. 277-284 [doi]
- SneakLeak: Detecting Multipartite Leakage Paths in Android AppsShweta Bhandari, Frédéric Herbreteau, Vijay Laxmi, Akka Zemmari, Partha S. Roop, Manoj Singh Gaur. 285-292 [doi]
- An Automated Formal Process for Detecting Fault Injection Vulnerabilities in Binaries and Case Study on PRESENTThomas Given-Wilson, Nisrine Jafri, Jean-Louis Lanet, Axel Legay. 293-300 [doi]
- Grouping-Proofs Based Access Control Using KP-ABE for IoT ApplicationsLyes Touati. 301-308 [doi]
- Mediator-Based Immediate Attribute Revocation Mechanism for CP-ABE in Multicast Group CommunicationsLyes Touati, Yacine Challal. 309-314 [doi]
- One-Round Provably Secure Yoking-Proof for RFID ApplicationsDa-Zhi Sun, Guangquan Xu. 315-322 [doi]
- Network Traffic Classification Using Tri-training Based on Statistical Flow CharacteristicsShuyuan Zhao, Yongzheng Zhang 0002, Peng Chang. 323-330 [doi]
- SniffDroid: Detection of Inter-App Privacy Leaks in AndroidVineeta Jain, Shweta Bhandari, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah. 331-338 [doi]
- Detecting DNS Tunnel through Binary-Classification Based on Behavior FeaturesJingkun Liu, Shuhao Li, Yongzheng Zhang 0002, Jun Xiao, Peng Chang, Chengwei Peng. 339-346 [doi]
- A Secure Virtual Machine Deployment Strategy to Reduce Co-residency in CloudYuqin Qiu, Qingni Shen, Yang Luo, Cong Li, Zhonghai Wu. 347-354 [doi]
- Improving Leakage Path Coverage in Android AppsGarima Modi, Vijay Laxmi, Smita Naval, Manoj Singh Gaur. 355-362 [doi]
- A Traceable Outsourcing CP-ABE Scheme with Attribute RevocationRuoqing Zhang, Lucas Hui, Sm Yiu, Xiaoqi Yu, Zechao Liu, Zoe L. Jiang. 363-370 [doi]
- Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor NetworksAnnie Gilda Roselin, Priyadarsi Nanda, Surya Nepal. 371-378 [doi]
- Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov ModelKhaled Aldebei, Helia Farhood, Wenjing Jia, Priyadarsi Nanda, Xiangjian He. 379-385 [doi]
- Access Control Policy Combination from Similarity Analysis for Secure Privacy-Preserved EHR SystemsFatemeh Rezaeibagha, Yi Mu. 386-393 [doi]
- A Relative Privacy Model for Effective Privacy Preservation in Transactional DataMichael Bewong, Jixue Liu, Lin Liu 0003, Jiuyong Li, Kim-Kwang Raymond Choo. 394-401 [doi]
- A Dual Privacy Preserving Scheme in Continuous Location-Based ServicesShaobo Zhang, Guojun Wang, Qin Liu. 402-408 [doi]
- A Near-Optimal Source Location Privacy Scheme for Wireless Sensor NetworksMatthew Bradbury, Arshad Jhumka. 409-416 [doi]
- Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss TransformMengmeng Yang, Tianqing Zhu, Lichuan Ma, Yang Xiang, Wanlei Zhou. 417-424 [doi]
- An Efficient Disjunctive Query Enabled Ranked Searchable Encryption SchemeShahzaib Tahir, Sushmita Ruj, Muttukrishnan Rajarajan. 425-432 [doi]
- An Efficient and Secure Itinerary-Based Data Aggregation Algorithm for WSNsTaochun Wang, Ji Zhang, Yonglong Luo, KaiZhong Zuo, Xintao Ding. 433-440 [doi]
- Dummy Location Selection Scheme for K-Anonymity in Location Based ServicesDi Wu 0004, Yu Zhang, YinLong Liu. 441-448 [doi]
- Secure FPGA as a Service - Towards Secure Data Processing by Physicalizing the CloudMark A. Will, Ryan K. L. Ko. 449-455 [doi]
- Privacy-Preserving Mechanisms for Parametric Survival Analysis with Weibull DistributionThông T. Nguyên, Siu Cheung Hui. 456-463 [doi]
- How to Cooperate Locally to Improve Global Privacy in Social Networks? On Amplification of Privacy Preserving Data AggregationKrzysztof Grining, Marek Klonowski, Malgorzata Sulkowska. 464-471 [doi]
- Privacy-Preserving Aggregation of Smart Metering via Transformation and EncryptionLingjuan Lyu, Yee Wei Law, Jiong Jin, Marimuthu Palaniswami. 472-479 [doi]
- Privacy-Preserving and Collusion-aware k-NN Query Processing in Two-tiered Sensor NetworksJuru Zeng, Hong Chen, Weiling Lai, Ying Liu, Cuiping Li, Shan Wang. 480-486 [doi]
- NodeLeaper: Lower Overhead Oblivious AVL TreeYao Liu, Qingkai Zeng, Pinghai Yuan. 487-493 [doi]
- Assessing the Privacy Cost in Centralized Event-Based Demand Response for MicrogridsAreg Karapetyan, Syafiq Kamarul Azman, Zeyar Aung. 494-501 [doi]
- Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access ControlMeng Liu, Xuyun Zhang, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren. 502-509 [doi]
- A Trajectory Privacy-Preserving Algorithm Based on Road Networks in Continuous Location-Based ServicesAyong Ye, Yacheng Li, Li Xu, Qing Li, Hui Lin. 510-516 [doi]
- Deformable Template Matching Using Proposal-Based Best-Buddies SimilarityHaiying Xia, Wenxian Zhao, Zheng Zhou, Frank Jiang 0001, Haisheng Li, Xiangjian He. 517-521 [doi]
- Anonymous CoinJoin Transactions with Arbitrary ValuesFelix Konstantin Maurer, Till Neudecker, Martin Florian. 522-529 [doi]
- SOMR: Towards a Security-Oriented MapReduce InfrastructureRui Zhao, Zhao-Peng Meng, Yan Zheng, Qiangguo Jin, Anbang Ruan, Hanglun Xie. 530-537 [doi]
- Feedback Entropy: A New Metric to Detect Unfair Rating Attacks for Trust Computing in Cloud EnvironmentsManel Mrabet, Yosra Ben Saied, Leïla Azouz Saïdane. 538-545 [doi]
- Beyond the Hype: On Using Blockchains in Trust Management for AuthenticationNikolaos Alexopoulos, Jörg Daubert, Max Mühlhäuser, Sheikh Mahbub Habib. 546-553 [doi]
- Adaptive Threshold Scheme for Touchscreen Gesture Continuous Authentication Using Sensor TrustMax Smith-Creasey, Muttukrishnan Rajarajan. 554-561 [doi]
- Advancing Trust Visualisations for Wider Applicability and User AcceptanceOksana Kulyk, Benjamin Maximilian Reinheimer, Paul Gerber, Florian Volk, Melanie Volkamer, Max Mühlhäuser. 562-569 [doi]
- Towards Cross-Domain eID by Using Agile Mobile AuthenticationThomas Lenz, Lukas Alber. 570-577 [doi]
- Design and Analysis of a Modified Remote Attestation ProtocolMonika Santra, Sateesh K. Peddoju, A. K. Bhattacharjee, Arindam Khan 0002. 578-585 [doi]
- A New Fuzzy Clustering Approach for Reputation Management in OSNsSana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, Sadok Ben Yahia. 586-593 [doi]
- Exploring Granular flow Integrity for Interconnected Trusted PlatformsAdrian L. Shaw, Hamza Attak. 594-601 [doi]
- IoT Trust Estimation in an Unknown Place Using the Opinions of I-Sharing FriendsBumjin Gwak, Heesuk Son, Jiyoon Kang, Dongman Lee. 602-609 [doi]
- Controversy-Aware Hybrid Trust Inference in Online Social NetworksPaolo Zicari, Roberto Interdonato, Andrea Tagarelli, Sergio Greco. 610-617 [doi]
- Ordol: Obfuscation-Resilient Detection of Libraries in Android ApplicationsDennis Titze, Michael Lux, Julian Schütte. 618-625 [doi]
- A Methodology for Privacy-Aware IoT-ForensicsAna Nieto, Ruben Rios, Javier Lopez. 626-633 [doi]
- A Fault-based Attack on AEZ v4.2Hassan Qahur Al Mahri, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong. 634-641 [doi]
- Digital Witness and Privacy in IoT: Anonymous Witnessing ApproachAna Nieto, Ruben Rios, Javier Lopez. 642-649 [doi]
- Enhanced Operating System Protection to Support Digital Forensic InvestigationsJeffrey Todd McDonald, Ramya Manikyam, William Bradley Glisson, Todd R. Andel, Yuan Xiang Gu. 650-659 [doi]
- ProtectCall: Call Protection Based on User ReputationIbrahim Tariq Javed, Khalifa Toumi, Noël Crespi. 660-667 [doi]
- Anonymous Anti-Sybil Attack Protocol for Mobile Healthcare Networks AnalyticsPeng Zhang, XiaFei Zhang, Xiaoqiang Sun, Joseph K. Liu, Jianping Yu, Zoe L. Jiang. 668-674 [doi]
- Implementing Chain of Custody Requirements in Database Audit Records for Forensic PurposesDenys A. Flores, Arshad Jhumka. 675-682 [doi]
- Toward Proxy Re-encryption From Learning with Errors in the ExponentZengpeng Li, Chunguang Ma, Ding Wang, Minghao Zhao, Qian Zhao, Lu Zhou. 683-690 [doi]
- NetworkTrace: Probabilistic Relevant Pattern Recognition Approach to Attribution Trace AnalysisJian Xu, Xiaochun Yun, Yongzheng Zhang 0002, Yafei Sang, Zhenyu Cheng. 691-698 [doi]
- Volkswagen Car Entertainment System ForensicsDaniel Jacobs, Kim-Kwang Raymond Choo, M. Tahar Kechadi, Nhien-An Le-Khac. 699-705 [doi]
- Detecting Permission Over-claim of Android Applications with Static and Semantic Analysis ApproachJunwei Tang, Ruixuan Li, Hongmu Han, Heng Zhang, Xiwu Gu. 706-713 [doi]
- Situation Semantics Aggregator for Realtime Simulation on Organizational BehaviorsYan Zhang, Lejian Liao, Chang Xu, Licheng Shi. 714-720 [doi]
- Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2Hiroshi Nomaguchi, Atsuko Miyaji, Chunhua Su. 721-728 [doi]
- Adapting MapReduce for Efficient Watermarking of Large Relational DatasetSapana Rani, Dileep Kumar Koshley, Raju Halder. 729-736 [doi]
- Privileged Data Within Digital EvidenceDominique Fleurbaaij, Mark Scanlon, Nhien-An Le-Khac. 737-744 [doi]
- GPU Register Packing: Dynamically Exploiting Narrow-Width Operands to Improve PerformanceXin Wang, Wei Zhang. 745-752 [doi]
- A Sample-Based Dynamic CPU and GPU LLC Bypassing Method for Heterogeneous CPU-GPU ArchitecturesXin Wang, Wei Zhang. 753-760 [doi]
- A Hybrid Heuristic-Genetic Algorithm with Adaptive Parameters for Static Task Scheduling in Heterogeneous Computing SystemShan Ding, Jinhui Wu, Guoqi Xie, Gang Zeng. 761-766 [doi]
- Mixed-Criticality Control System with Performance and Robustness GuaranteesLong Cheng, Kai Huang 0002, Gang Chen 0023, Biao Hu, Alois Knoll. 767-775 [doi]
- HiNextApp: A Context-Aware and Adaptive Framework for App Prediction in Mobile SystemsChaoneng Xiang, Duo Liu, Shiming Li, Xiao Zhu, Yang Li, Jinting Ren, Liang Liang. 776-783 [doi]
- TINET+TECS: Component-Based TCP/IP Protocol Stack for Embedded SystemsTakuro Yamamoto, Takuma Hara, Takuya Ishikawa, Hiroshi Oyama, Hiroaki Takada, Takuya Azumi. 784-791 [doi]
- Design and Implementation of a Lightweight Smart Insole for Gait AnalysisHyuntae Cho. 792-797 [doi]
- A Real-Time Operating System with CAN-Based Inter-Node Shared Resource Management and Distributed Shared MemoryKota Ishibashi, Myungryun Yoo, Takanori Yokoyama. 798-805 [doi]
- McFTP: A Framework to Explore and Prototype Multi-core Thermal Managements on Real ProcessorsLong Cheng, Zhihao Zhao, Kai Huang 0002, Gang Chen 0023, Alois Knoll. 806-814 [doi]
- Integrating Cache-Related Preemption Delay into GEDF Analysis for Multiprocessor Scheduling with On-chip CacheYing Zhang, Zhishan Guo, Lingxiang Wang, Haoyi Xiong, Zhenkai Zhang. 815-822 [doi]
- Return-Oriented Programming on a Cortex-M ProcessorNathanael R. Weidler, Dane Brown, Samuel A. Mitchell, Joel Anderson, Jonathan R. Williams, Austin Costley, Chase Kunz, Christopher Wilkinson, Remy Wehbe, Ryan M. Gerdes. 823-832 [doi]
- Analysis of Authentication Parameters in Uplink Scenario of Heterogeneous NetworksMahsa Foruhandeh, Ryan M. Gerdes. 833-838 [doi]
- Queuing Theory-Guided Performance Evaluation for a Reconfigurable High-Speed Device Interconnected BusWeiwen Chen, Keni Qiu, Jiqin Zhou, Yuanhui Ni, Yuanchao Xu. 839-843 [doi]
- Pipeline Optimizations of Architecting STT-RAM as Registers in Rad-Hard EnvironmentZhiyao Gong, Keni Qiu, Weiwen Chen, Yuanhui Ni, Yuanchao Xu, Jianlei Yang. 844-852 [doi]
- Industrial Big Data Visualization: A Case Study Using Flight Data Recordings to Discover the Factors Affecting the Airplane Fuel EfficiencyMing Li, Qin Zhou. 853-858 [doi]
- Robust Vehicle Classification Based on the Combination of Deep Features and Handcrafted FeaturesLiying Jiang, Jiafeng Li, Li Zhuo, Ziqi Zhu. 859-865 [doi]
- Precision-Enhanced Image Attribute Prediction ModelChen Hu, Jiaxin Miao, Zhuo Su, Xiaohong Shi, Qiang Chen, Xiaonan Luo. 866-872 [doi]
- Implementing A Framework for Big Data Anonymity and Analytics Access ControlMohammed Al-Zobbi, Seyed A. Shahrestani, Chun Ruan. 873-880 [doi]
- Mapping ECG Signal Sequences on Variant MapsLihua Leng, Jeffery Zheng. 881-884 [doi]
- Leveraging NoSQL for Scalable and Dynamic Data Encryption in Multi-tenant SaaSAnsar Rafique, Dimitri Van Landuyt, Vincent Reniers, Wouter Joosen. 885-892 [doi]
- Large-Scale Multi-label Ensemble Learning on SparkJorge Gonzalez-Lopez, Alberto Cano 0001, Sebastián Ventura. 893-900 [doi]
- Vehicle Incident Hot Spots Identification: An Approach for Big DataIsaac Triguero, Grazziela P. Figueredo, Mohammad Mesgarpour, Jonathan M. Garibaldi, Robert I. John. 901-908 [doi]
- Sensor Data Modeling for Data TrustworthinessKarthik N, Ananthanarayana V. S. 909-916 [doi]
- Efficient Privacy-Preserving Outsourcing of Large-Scale QR FactorizationChangqing Luo, Kaijin Zhang, Sergio Salinas, Pan Li 0001. 917-924 [doi]
- A Data Science and Engineering Solution for Fast K-Means Clustering of Big DataKarl E. Dierckens, Adrian B. Harrison, Carson K. Leung, Adrienne V. Pind. 925-932 [doi]
- Automatically Design Distance Functions for Graph-Based Semi-Supervised LearningPatricia Miquilini, Rafael Geraldeli Rossi, Marcos G. Quiles, Vinicius Veloso de Melo, Márcio P. Basgalupp. 933-940 [doi]
- GEEK: Grammatical Evolution for Automatically Evolving Kernel FunctionsArua De M. Sousa, Ana Carolina Lorena, Márcio P. Basgalupp. 941-948 [doi]
- Trust Integration for Security Optimisation in P2P-Based M2M ApplicationsBesfort Shala, Patrick Wacht, Ulrich Trick, Armin Lehmann, Bogdan V. Ghita, Stavros Shiaeles. 949-954 [doi]
- Privacy-Preserving Queries over Secret-Shared Graph-Structured DataLeyla Roohi, Vanessa Teague. 955-960 [doi]
- Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUSMd. Iftekhar Salam, Leonie Simpson, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Kenneth Koon-Ho Wong. 961-966 [doi]
- Web Anomaly Detection Based on Frequent Closed Episode RulesLei Wang, Shoufeng Cao, Lin Wan, Fengyu Wang. 967-972 [doi]
- Particle Size Measurement Based on Image Multivariate Multiscale EntropyYantong Zhan, Guoying Zhang, Yu Guo, Hang Meng, Xuejun Zhao. 973-977 [doi]
- An Intrusion Detection System Based on Polynomial Feature Correlation AnalysisQingru Li, Zhiyuan Tan, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He, Wei Han. 978-983 [doi]
- An Integration Testing Platform for Software Vulnerability Detection MethodJin Li, Jinfu Chen, Minhuan Huang, Minmin Zhou, Lin Zhang, Wanggen Xie. 984-989 [doi]
- Privacy Protection-Oriented Mobile Crowdsensing Analysis Based on Game TheoryRong Ma, Jinbo Xiong, Mingwei Lin, Zhiqiang Yao, Hui Lin, Ayong Ye. 990-995 [doi]
- (p, N)-identifiability: Anonymity under Practical AdversariesTomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka, Atsuko Miyaji. 996-1003 [doi]
- Base Extent Optimization for RNS Montgomery AlgorithmYifeng Mo, Shuguo Li. 1004-1009 [doi]
- Security and Resilience in 5G: Current Challenges and Future DirectionsGhada Arfaoui, José Manuel Sánchez-Vilchez, Jean-Philippe Wary. 1010-1015 [doi]
- A Survey on Authorization in Distributed Systems: Information Storage, Data Retrieval and Trust EvaluationAva Ahadipour, Martin Schanzenbach. 1016-1023 [doi]
- Anonymous Data Sharing Between Organisations with Elliptic Curve CryptographyMark A. Will, Ryan K. L. Ko, Silvino J. Schlickmann. 1024-1031 [doi]
- Fault Injection Attack on Salsa20 and ChaCha and a Lightweight CountermeasureKazuhide Fukushima, Rui Xu, Shinsaku Kiyomoto, Naofumi Homma. 1032-1037 [doi]
- Applications of Visualization Technology for Network SecurityHaina Tang, Chunjing Han, Jingguo Ge. 1038-1042 [doi]
- Security Modeling and Analysis of Cross-Protocol IoT DevicesMengmeng Ge, Jin B. Hong, Hani Alzaid, Dong Seong Kim. 1043-1048 [doi]
- Performance Evaluation of RPL Protocol under Mobile Sybil AttacksFaiza Medjek, Djamel Tandjaoui, Imed Romdhani, Nabil Djedjig. 1049-1055 [doi]
- Implementing Usage Control in Internet of Things: A Smart Home Use CaseAntonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino. 1056-1063 [doi]
- A Reconfigurable High-Speed ECC Processor Over NIST PrimesJinnan Ding, Shuguo Li. 1064-1069 [doi]
- Outsourcing Privacy Preserving ID3 Decision Tree Algorithm over Encrypted Data-sets for Two-PartiesYe Li, Zoe L. Jiang, Xuan Wang, S. M. Yiu, Peng Zhang. 1070-1075 [doi]
- Investigation and Automating Extraction of Thumbnails Produced by Image ViewersWybren van der Meer, Kim-Kwang Raymond Choo, M. Tahar Kechadi, Nhien-An Le-Khac. 1076-1081 [doi]
- Corruption-Resistant Privacy Preserving Distributed EM Algorithm for Model-Based ClusteringKaleb L. Leemaqz, Sharon X. Lee, Geoffrey J. McLachlan. 1082-1089 [doi]
- A Testbed for Security Analysis of Modern Vehicle SystemsXi Zheng, Lei Pan, Hongxu Chen, Rick Di Pietro, Lynn Batten. 1090-1095 [doi]
- An Eclat Algorithm Based Energy Detection for Cognitive Radio NetworksFan Jin, Vijay Varadharajan, Udaya Kiran Tupakula. 1096-1102 [doi]
- Deployment of Intrusion Detection System in Cloud: A Performance-Based StudyVarun Mahajan, Sateesh K. Peddoju. 1103-1108 [doi]
- FBRC: Optimization of task Scheduling in Fog-Based Region and CloudDoan Hoang, Thanh Dat Dang. 1109-1114 [doi]
- On the Performance of a Trustworthy Remote Entity in Comparison to Secure Multi-party ComputationRobin Ankele, Andrew Simpson. 1115-1122 [doi]
- Visualizing the New Zealand Cyber Security Challenge for Attack BehaviorsJeffery Garae, Ryan K. L. Ko, Janice Kho, Saidah Suwadi, Mark A. Will, Mark Apperley. 1123-1130 [doi]
- Attribution Using Keyboard Row Based Behavioural Biometrics for Handedness RecognitionSam Shute, Ryan K. L. Ko, Sivadon Chaisiri. 1131-1138 [doi]
- Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users are?Amber Umair, Priyadarsi Nanda, Xiangjian He. 1139-1144 [doi]
- An Efficient Approach for Advanced Malware Analysis Using Memory Forensic TechniqueChathuranga Rathnayaka, Aruna Jamdagni. 1145-1150 [doi]