Abstract is missing.
- Engineering Trust: A Graph-Based Algorithm for Modeling, Validating, and Evaluating TrustScot Tucker. 1-9 [doi]
- A Novel Dynamic Cloud Service Trust Evaluation Model in Cloud ComputingYubiao Wang, Junhao Wen, Wei Zhou, Fengji Luo. 10-15 [doi]
- One Secure Access Scheme Based on Trusted Execution EnvironmentYongkai Fan, Shengle Liu, Gang Tan, Xiaodong Lin, Guanqun Zhao, Jianrong Bai. 16-21 [doi]
- Evaluation of Flexilink as Deterministic Unified Real-Time Protocol for Industrial NetworksTianao Ma, Wei Hu 0001, Yonghao Wang, Dalia El-Banna, John Grant, Hongjun Dai. 22-27 [doi]
- Understanding Trust, Privacy and Financial Fears in Online PaymentGhada El Haddad, Esma Aïmeur, Hicham Hage. 28-36 [doi]
- DecentID: Decentralized and Privacy-Preserving Identity Storage System Using Smart ContractsSebastian Friebe, Ingo Sobik, Martina Zitterbart. 37-42 [doi]
- Reputation Prediction Using Influence ConversionMonika Ewa Rakoczy, Amel Bouzeghoub, Alda Lopes Gançarski, Katarzyna Wegrzyn-Wolska. 43-48 [doi]
- Secure, Resilient, and Self-Configuring Fog Architecture for Untrustworthy IoT EnvironmentsMostafa Kahla, Mohamed Azab, Ahmed Mansour. 49-54 [doi]
- Repoxy: Replication Proxy for Trustworthy SDN Controller OperationMohamed Azab, Ahmed Hamdy, Ahmed Mansour. 55-60 [doi]
- A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor NetworksConcepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Georges A. Kamhoua. 61-67 [doi]
- Encrypted Domain Mel-Frequency Cepstral Coefficient and Fragile Audio WatermarkingJian Chen, Ziyang Chen, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang. 68-73 [doi]
- TARAS: Trust-Aware Role-Based Access Control System in Public Internet-of-ThingsBumjin Gwak, Jin-Hee Cho, Dongman Lee, Heesuk Son. 74-85 [doi]
- A Privacy-Preserving Multipurpose Watermarking Scheme for Audio Authentication and ProtectionJian Chen, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang. 86-91 [doi]
- Dynamic Survivable Path Routing for Fast Changing IoT Network TopologiesManu Elappila, Suchismita Chinara. 92-97 [doi]
- BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETsZhaojun Lu, Qian Wang, Gang Qu, Zhenglin Liu. 98-103 [doi]
- Turning Trust Around: Smart Contract-Assisted Public Key InfrastructureAbu Shohel Ahmed, Tuomas Aura. 104-111 [doi]
- N-Combat: A Nuisance Call Combating Framework for Internet TelephonyIbrahim Tariq Javed, Khalifa Toumi, Noël Crespi. 112-117 [doi]
- A Comprehensive Analysis of Packet Loss in MANETsMuhammad Saleem Khan, Saira Waris, Idrees Ahmed, Majid Iqbal Khan. 118-123 [doi]
- Trust4App: Automating Trustworthiness Assessment of Mobile ApplicationsSheikh Mahbub Habib, Nikolaos Alexopoulos, Md Monirul Islam, Jens Heider, Stephen Marsh 0001, Max Mühlhäuser. 124-135 [doi]
- Bionic Mechanism Based Dynamic Trust Evaluation Method in Cloud EnvironmentShunan Ma, Xunbo Shuai, Zhaohua Zhou, Kechun Qiao. 136-141 [doi]
- A Universal Secret Sharing Scheme with General Access Structure Based on CRTKeju Meng, Fuyou Miao, Yue Yu, Changbin Lu. 142-148 [doi]
- ESRQ: An Efficient Secure Routing Method in Wireless Sensor Networks Based on Q-LearningGaosheng Liu, Xin Wang, Xiaohong Li, Jianye Hao, Zhiyong Feng. 149-155 [doi]
- Trust-Based Dynamic Linear Threshold Models for Non-competitive and Competitive Influence PropagationAntonio Caliò, Andrea Tagarelli. 156-162 [doi]
- Securing the Internet of Things (IoT): A Security Taxonomy for IoTSyed S. Rizvi, Andrew Kurtz, Joseph R. Pfeffer III, Mohammad Rizvi. 163-168 [doi]
- A Trust Energy-Efficient QoS Routing Scheme for Mobile Peer-to-Peer NetworksDapeng Qu, Dengyu Liang, Songlin Wu, Jie Li, Weihong Xuan, Xingwei Wang 0001. 169-176 [doi]
- Testing Sequence Generation Method Based on Unrelated Behaviors SerializingTao Sun, Xin Guo, Ting Zhang. 177-183 [doi]
- Manipulating Visibility of Political and Apolitical Threads on Reddit via Score BoostingMark Carman, Mark Koerber, Jiuyong Li, Kim-Kwang Raymond Choo, Helen Ashman. 184-190 [doi]
- Using Evolutionary Approaches to Manage Surveillance Cameras in Dynamic EnvironmentsRuidan Li, Errin W. Fulp. 191-196 [doi]
- An Elite Clone Parallel Genetic Algorithm for Trust Monitoring Assignment Problem in Adaptive Wireless Sensor NetworksJie Zhou, Min Tian. 197-203 [doi]
- Quality of Information as an indicator of Trust in the Internet of ThingsHamza Baqa, Nguyen Binh Truong, Noël Crespi, Gyu Myoung Lee, Franck Le Gall. 204-211 [doi]
- A Reinforcement Learning Approach for Attack Graph AnalysisMehdi Yousefi, Nhamo Mtetwa, Yan Zhang, Huaglory Tianfield. 212-217 [doi]
- Research on Industrial Control Anomaly Detection Based on FCM and SVMWenli Shang, Junrong Cui, Chunhe Song, Jianming Zhao, Peng Zeng. 218-222 [doi]
- Authorized Equality Test of Encrypted Data for Secure Cloud DatabasesSha Ma. 223-230 [doi]
- Exploring the Feasibility of Physical Layer Key Generation for LoRaWANWeitao Xu, Sanjay Jha, Wen Hu. 231-236 [doi]
- DDoS Flooding Attack Detection Based on Joint-Entropy with Multiple Traffic FeaturesJiewen Mao, Weijun Deng, Fuke Shen. 237-243 [doi]
- Practical Decentralized Attribute-Based Delegation Using Secure Name SystemsMartin Schanzenbach, Christian Banse, Julian Schütte. 244-251 [doi]
- Abnormal Item Detection Based on Time Window Merging for Recommender SystemsLingtao Qi, Haiping Huang, Peng Wang, Ru-chuan Wang. 252-259 [doi]
- Application of Visual Analysis to Detect and Analyze Patterns in VoIP Attack TrafficEkaterina Volodina, Adnan Aziz, Erwin P. Rathgeb, Tobias Hoßfeld. 260-268 [doi]
- A Quality Evaluation Method of Cyber Threat Intelligence in User PerspectiveQiang Li, Zhengwei Jiang, Zeming Yang, Baoxu Liu, Xin Wang, Yunan Zhang. 269-276 [doi]
- Towards Better Ocular Recognition for Secure Real-World ApplicationsReza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo. 277-282 [doi]
- Identifying Peer-to-Peer Botnets Through Periodicity Behavior AnalysisPengfei Wang, Fengyu Wang, Fengbo Lin, Zhenzhong Cao. 283-288 [doi]
- LUCON: Data Flow Control for Message-Based IoT SystemsJulian Schütte, Gerd Stefan Brost. 289-299 [doi]
- Cache-Collision Attacks on GPU-Based AES Implementation with Electro-Magnetic LeakagesYiwen Gao, Wei Cheng, Hailong Zhang 0001, Yongbin Zhou. 300-306 [doi]
- An Improved Monte Carlo Graph Search Algorithm for Optimal Attack Path AnalysisHui Xie, Kun Lv, Changzhen Hu. 307-315 [doi]
- Adversarial Gait Detection on Mobile Devices Using Recurrent Neural NetworksDevu Manikantan Shila, Emeka Eyisi. 316-321 [doi]
- AES Design Improvements Towards Information Security Considering Scan AttackLiting Yu, Dongrong Zhang, Liang Wu, Shuguo Xie, Donglin Su, Xiaoxiao Wang. 322-326 [doi]
- Automated Breast Cancer Detection Using Machine Learning Techniques by Extracting Different Feature Extracting StrategiesLal Hussain, Wajid Aziz, Sharjil Saeed, Saima Rathore, Muhammad Rafique. 327-331 [doi]
- Electronic Evidence Service Research in Cloud Computing EnvironmentZhenya Chen, Weifeng Liu, Ying Yang, Jizhi Wang, Meng Guo, Lijuan Chen, Guang Yang, Jie Zhou. 332-338 [doi]
- STDC: A SDN-Oriented Two-Stage DDoS Detection and Defence System Based on ClusteringShuang Wei, Shuaifu Dai, Xinfeng Wu, Xinhui Han. 339-347 [doi]
- Semantic-Based Policy Composition for Privacy-Demanding Data LinkageYang Lu, Richard O. Sinnott, Karin Verspoor. 348-359 [doi]
- TempatMDS: A Masquerade Detection System Based on Temporal and Spatial Analysis of File Access RecordsJiarong Wang, Lijun Cai, Aimin Yu, Min Zhu, Dan Meng. 360-371 [doi]
- Effective Botnet Detection Through Neural Networks on Convolutional FeaturesShao-Chien Chen, Yi-Ruei Chen, Wen-Guey Tzeng. 372-378 [doi]
- Online Allocation of Cloud Resources Based on Security SatisfactionTalal Halabi, Martine Bellaïche, Adel Abusitta. 379-384 [doi]
- Enhancing Data Protection in a Distributed Storage Environment Using Structure-Wise Fragmentation and Dispersal of Encrypted DataKatarzyna Kapusta, Gérard Memmi. 385-390 [doi]
- eBot: Approach Towards Modeling an Advanced P2P BotnetSumit Kumar Tetarave, Somanath Tripathy, Ezhil Kalaimannan, Caroline John. 391-396 [doi]
- A Practical Accountability Scheme for Oblivious RAM in Cloud StorageHuikang Cao, Ruixuan Li, Wenlong Tian, Zhiyong Xu, Weijun Xiao. 397-402 [doi]
- For Small Merchants: A Secure Smartphone-Based Architecture to Process and Accept NFC PaymentsNour El Madhoun, Emmanuel Bertin, Guy Pujolle. 403-411 [doi]
- Outsourced Private Function Evaluation with Privacy Policy EnforcementNoboru Kunihiro, Wenjie Lu, Takashi Nishide, Jun Sakuma. 412-423 [doi]
- Universal Optimality of Apollonian Cell EncodersFabrizio Biondi, Thomas Given-Wilson, Axel Legay. 424-435 [doi]
- An Evidential Clustering Based Framework for Cyber Terrorist Cells Topology IdentificationFiras Saidi, Zouheir Trabelsi, Henda Ben Ghazela. 436-443 [doi]
- On Designing a Questionnaire Based Honeyword Generation Approach for Achieving FlatnessNilesh Chakraborty, Shreya Singh, Samrat Mondal. 444-455 [doi]
- A Composite Malicious Peer Eviction Mechanism for Super-P2P SystemsHatem Ismail, Stefanie Roos, Neeraj Suri. 456-464 [doi]
- S-Audit: Efficient Data Integrity Verification for Cloud StorageFilipe Apolinario, Miguel L. Pardal, Miguel P. Correia. 465-474 [doi]
- Detecting Intruders and Preventing Hackers from Evasion by Tor Circuit SelectionZechun Cao, Shou-Hsuan Stephen Huang. 475-480 [doi]
- Good Vibrations: Artificial Ambience-Based Relay Attack DetectionIakovos Gurulian, Konstantinos Markantonakis, Eibe Frank, Raja Naeem Akram. 481-489 [doi]
- Selecting System Specific Cybersecurity Attack Patterns Using Topic ModelingStephen Adams, Bryan T. Carter, Cody Harrison Fleming, Peter A. Beling. 490-497 [doi]
- Digital Blues: An Investigation Into the Use of Bluetooth ProtocolsWilliam Ledbetter, William Bradley Glisson, Todd McDonald, Todd R. Andel, George Grispos, Kim-Kwang Raymond Choo. 498-503 [doi]
- Inscription: Thwarting ActionScript Web Attacks From WithinMeera Sridhar, Abhinav Mohanty, Fadi Yilmaz, Vasant Tendulkar, Kevin W. Hamlen. 504-515 [doi]
- A Malicious Attack on the Machine Learning Policy of a Robotic SystemGeorge W. Clark, Michael V. Doran, William Glisson. 516-521 [doi]
- Continuous Authentication System Using Online ActivitiesHidehito Gomi, Shuji Yamaguchi, Kota Tsubouchi, Naomi Sasaya. 522-532 [doi]
- Permission Analysis of Health and Fitness Apps in IoT Programming FrameworksMehdi Nobakht, Yulei Sui, Aruna Seneviratne, Wen Hu. 533-538 [doi]
- Black Hole Attack Prevention Method Using Multiple RREPs in Mobile Ad Hoc NetworksTaku Noguchi, Mayuko Hayakawa. 539-544 [doi]
- TMDFI: Tagged Memory Assisted for Fine-Grained Data-Flow Integrity Towards Embedded Systems Against Software ExploitationTong Liu, Gang Shi, Liwei Chen, Fei Zhang, Yaxuan Yang, Jihu Zhang. 545-550 [doi]
- Accessing Data from Multiple Sources Through Context-Aware Access ControlA. S. M. Kayes, J. Wenny Rahayu, Tharam S. Dillon, Elizabeth Chang. 551-559 [doi]
- Efficient Binary-Encoding Access Control Policy Combination for Large-Scale Collaborative ScenariosChunhua Li, Weirui Xie, Ke Zhou. 560-566 [doi]
- FlowHacker: Detecting Unknown Network Attacks in Big Traffic Data Using Network FlowsLuis Sacramento, Iberia Medeiros, Joao Bota, Miguel Correia 0001. 567-572 [doi]
- Evaluation for Combination of Shuffle and Diversity on Moving Target Defense Strategy for Cloud ComputingHooman Alavizadeh, Julian Jang-Jaccard, Dong Seong Kim. 573-578 [doi]
- FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined NetworksDilli Prasad Sharma, Dong Seong Kim, Seunghyun Yoon 0001, Hyuk Lim, Jin-Hee Cho, Terrence J. Moore. 579-587 [doi]
- Time Independent Security Analysis for Dynamic Networks Using Graphical Security ModelsSimon Enoch Yusuf, Jin B. Hong, Dong Seong Kim. 588-595 [doi]
- Practical Location Validation in Participatory Sensing Through Mobile WiFi HotspotsAndrea Saracino, Francesco Restuccia, Fabio Martinelli. 596-607 [doi]
- MASFOG: An Efficient Mutual Authentication Scheme for Fog Computing ArchitectureYoucef Imine, Djamel Eddine Kouicem, Abdelmadjid Bouabdallah, Ahmed Lounis. 608-613 [doi]
- A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud StorageZechao Liu, Zoe L. Jiang, Xuan Wang, Siu-Ming Yiu, Ruoqing Zhang, Yulin Wu. 614-623 [doi]
- DroidPro: An AOTC-Based Bytecode-Hiding Scheme for Packing the Android ApplicationsJudong Bao, Yongqiang He, Weiping Wen. 624-632 [doi]
- Machine Learning for Reliable Network Attack Detection in SCADA SystemsRocio Lopez Perez, Florian Adamsky, Ridha Soua, Thomas Engel 0001. 633-638 [doi]
- A Full-Scale Security Visualization Effectiveness Measurement and Presentation ApproachJeffery Garae, Ryan K. L. Ko, Mark Apperley. 639-650 [doi]
- Beware of SMOMBIES: Verification of Users Based on Activities While WalkingEric Klieme, Christian Tietz, Christoph Meinel. 651-660 [doi]
- Data Mining Based Strategy for Detecting Malicious PDF FilesSamir G. Sayed, Mohmed Shawkey. 661-667 [doi]
- A National Mobile Identity Management Strategy for Electronic Government ServicesGlaidson Menegazzo Verzeletti, Emerson Ribeiro de Mello, Michelle Silva Wangham. 668-673 [doi]
- Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular NetworksNisha Malik, Priyadarsi Nanda, Arushi Arora, Xiangjian He, Deepak Puthal. 674-679 [doi]
- Fully Decentralized Authentication and Revocation Scheme in Data Sharing SystemsXiehua Li, Jie Jiang, Yichen Chen. 680-686 [doi]
- FloodShield: Securing the SDN Infrastructure Against Denial-of-Service AttacksMenghao Zhang, Jun Bi, Jiasong Bai, Guanyu Li. 687-698 [doi]
- A Lightweight FourQ Primitive on ARM Cortex-M0Wei Zhang 0031, Dongdai Lin, Hailong Zhang 0001, Xiaojun Zhou, Yiwen Gao. 699-704 [doi]
- Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation FrameworkDanjun Liu, Jingyuan Wang, Zelin Rong, Xianya Mi, Fangyu Gai, Yong Tang, Baosheng Wang. 705-712 [doi]
- Public Auditing for Network Coding Based Secure Cloud StorageXiang Liu 0004, Jie Huang, Guowen Zong. 713-720 [doi]
- Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation ProtocolSyed S. Rizvi, Joseph Gualdoni, Abdul Razaque. 721-726 [doi]
- A Novel Multi-source Fusion Model for Known and Unknown Attack ScenariosQiwen Wang, Jianguo Jiang, Zhixin Shi, Wen Wang, Bin Lv, Biao Qi, Qilei Yin. 727-736 [doi]
- Adaptive Malicious URL Detection: Learning in the Presence of Concept DriftsGuolin Tan, Peng Zhang, Qingyun Liu, Xinran Liu, Chunge Zhu, Fenghu Dou. 737-743 [doi]
- Hierarchical Clustering Based Network Traffic Data Reduction for Improving Suspicious Flow DetectionLiya Su, Yepeng Yao, Ning Li, Junrong Liu, Zhigang Lu, Baoxu Liu. 744-753 [doi]
- BotCensor: Detecting DGA-Based Botnet Using Two-Stage Anomaly DetectionBiao Qi, Jianguo Jiang, Zhixin Shi, Rui Mao, Qiwen Wang. 754-762 [doi]
- A General and Expandable Insider Threat Detection System Using Baseline Anomaly Detection and Scenario-Driven Alarm FiltersGuang Yang, Lijun Cai, Aimin Yu, Dan Meng. 763-773 [doi]
- Provably Secure Password Reset Protocol: Model, Definition, and ConstructionSatsuya Ohata, Takahiro Matsuda 0002, Kanta Matsuura. 774-782 [doi]
- VegaStar: An Illegal Domain Detection System on Large-Scale Video TrafficXiang Tian, Yujia Zhu, Zhao Li, Chao Zheng, Yong Sun, Qingyun Liu. 783-789 [doi]
- An Experimental Flow Secure File SystemRudrapatna K. Shyamasundar, N. V. Narendra Kumar, Abhijit Taware, Parjanya Vyas. 790-799 [doi]
- VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCSDanjun Liu, Yao Li, Yong Tang, Baosheng Wang, Wei Xie. 800-807 [doi]
- NTPDroid: A Hybrid Android Malware Detector Using Network Traffic and System PermissionsAnshul Arora, Sateesh Kumar Peddoju. 808-813 [doi]
- Energy Exhaustion Attack on Barrett's ReductionMohannad Mostafa, Tanushree Banerjee, M. Anwar Hasan. 814-818 [doi]
- Authentication of IoT Device and IoT Server Using Secure VaultsTrusit Shah, S. Venkatesan. 819-824 [doi]
- Using Feature Selection to Identify Chains of Insecure Software Configuration ParametersErrin W. Fulp, H. Donald Gage. 825-830 [doi]
- Reinforcing IoT-Enforced Security PoliciesNouha Oualha. 831-836 [doi]
- Enhancing Security and Scalability in Software Defined LTE Core NetworksRuichun Gu, Xiaolong Zhang, Lei Yu, Junxing Zhang. 837-842 [doi]
- Uninterrupted Video Surveillance in the Face of an AttackJagannadh Vempati, Ram Dantu, Mark A. Thompson. 843-848 [doi]
- Enhancing the Naive Bayes Spam Filter Through Intelligent Text Modification DetectionWuxu Peng, Linda Huang, Julia Jia, Emma Ingram. 849-854 [doi]
- A Case Study of Accelerating Apache Spark with FPGAJunjie Hou, Yongxin Zhu 0001, Linghe Kong, Zhe Wang, Sen Du, Shijin Song, Tian Huang. 855-860 [doi]
- A Multiple Layer Sercurity Architecture for Internet of Things into MVC DesignHongbo Chen, Hongjun Dai, Meikang Qiu. 861-866 [doi]
- Lightweight ECC with Fragile Zero-Watermarking for Internet of Things SecurityKinza Sarwar, Sira Yongchareon, Jian Yu. 867-872 [doi]
- Signature Renewal for Low Entropy DataAtighehchi Kevin, Barbier Morgan. 873-884 [doi]
- Profiling Network Traffic Behavior for the Purpose of Anomaly-Based Intrusion DetectionManmeet Singh Gill, Dale Lindskog, Pavol Zavarsky. 885-890 [doi]
- Steganographic Transports: A Vector for Hidden Secret Internets?Bernd Troegeler, Paul Watters. 891-896 [doi]
- Efficient Cross-User Deduplication of Encrypted Data Through Re-EncryptionXin Tang, Linna Zhou, Yongfeng Huang, Chin-Chen Chang. 897-904 [doi]
- Detecting Data Leakage from Databases on Android Apps with Concept DriftGökhan Kul, Shambhu J. Upadhyaya, Varun Chandola. 905-913 [doi]
- Acies: A Privacy-Preserving System for Edge-Based ClassificationWanli Xue, Yiran Shen, Chengwen Luo, Wen Hu, Aruna Seneviratne. 914-919 [doi]
- PAIRS: Privacy-Aware Identification and Recommendation of Spatio-FriendsShuo Wang, Richard O. Sinnott, Surya Nepal. 920-931 [doi]
- Lightweight Verification for Searchable EncryptionBoyang Wang, Xinxin Fan. 932-937 [doi]
- Privacy Parameter Variation Using RAPPOR on a Malware DatasetPeter Aaby, Juanjo Mata De Acuna, Richard Macfarlane, William J. Buchanan. 938-945 [doi]
- reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based EncryptionMartin Schanzenbach, Georg Bramm, Julian Schütte. 946-957 [doi]
- PUSC: Privacy-Preserving User-Centric Skyline Computation Over Multiple Encrypted DomainsXimeng Liu, Kim-Kwang Raymond Choo, Robert H. Deng, Yang Yang 0026, Yinghui Zhang. 958-963 [doi]
- Capstone: Mobility Modeling on Smartphones to Achieve Privacy by DesignVaibhav Kulkarni, Arielle Moro, Bertil Chapuis, Benoît Garbinato. 964-971 [doi]
- P-GENT: Privacy-Preserving Geocoding of Non-Geotagged TweetsShuo Wang, Richard O. Sinnott, Surya Nepal. 972-983 [doi]
- A Flow-Level Architecture for Balancing Accountability and PrivacyYuxiang Ma, Yulei Wu, Jingguo Ge, Jun Li. 984-989 [doi]
- Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' ProblemMeng Liu, Priyadarsi Nanda, Xuyun Zhang, Chi Yang, Shui Yu, Jianxin Li. 990-995 [doi]
- AuthStore: Password-Based Authentication and Encrypted Data Storage in Untrusted EnvironmentsClemens Zeidler, Muhammad Rizwan Asghar. 996-1001 [doi]
- SDLI: Static Detection of Leaks Across IntentsRocco Salvia, Pietro Ferrara, Fausto Spoto, Agostino Cortesi. 1002-1007 [doi]
- Software System Representation Methods Based on Algebraic ComponentZijun Yu, Chun Shan, Limin Mao, Changzhen Hu, Wenjie Xiong. 1008-1013 [doi]
- A Lightweight Multi-precision Squaring on Embedded Processors for ECCWei Zhang 0031, Dongdai Lin, Hailong Zhang 0001, Xiaojun Zhou, Yiwen Gao, Cong Chen. 1014-1019 [doi]
- A Systematic Method on PDF Privacy Leakage IssuesYun-feng, Baoxu Liu, Xiang Cui, Chaoge Liu, Xuebin Kang, Junwei Su. 1020-1029 [doi]
- Website Fingerprinting by Power Estimation Based Side-Channel Attacks on Android 7Yi Qin, Chuan Yue. 1030-1039 [doi]
- Do You Like What I Like? Similarity Estimation in Proximity-Based Mobile Social NetworksFelix Beierle. 1040-1047 [doi]
- Countering Intrusiveness Using New Security-Centric Ranking Algorithm Built on Top of ElasticsearchFadi Mohsen, Hamed Abdelhaq, Halil Bisgin, Andrew Jolly, Michael Szczepanski. 1048-1057 [doi]
- A Concept and Evaluation of Usable and Fine-Grained Privacy-Friendly Cookie Settings InterfaceOksana Kulyk, Peter Mayer, Melanie Volkamer, Oliver Kafer. 1058-1063 [doi]
- Highly Efficient Privacy-Preserving Key Agreement for Wireless Body Area NetworksHaibat Khan, Benjamin Dowling, Keith M. Martin. 1064-1069 [doi]
- Privacy Preserving Distributed Deep Learning and Its Application in Credit Card Fraud DetectionYang Wang, Stephen Adams, Peter A. Beling, Steven Greenspan, Sridhar Rajagopalan, Maria C. Velez-Rojas, Serge Mankovski, Steven M. Boker, Donald E. Brown. 1070-1078 [doi]
- Privacy-Preserving Access Control in Electronic Health Record LinkageYang Lu, Richard O. Sinnott, Karin M. Verspoor, Udaya Parampalli. 1079-1090 [doi]
- Track me if you can? Query Based Dual Location Privacy in VANETs for V2V and V2IMuhammad Arif, Guojun Wang, Tao Peng. 1091-1096 [doi]
- QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge ComputingRunhua Xu, Balaji Palanisamy, James Joshi. 1097-1106 [doi]
- PMDA: Privacy-Preserving Multi-functional Data Aggregation Without TTP in Smart GridZheng He, Shiran Pan, Dongdai Lin. 1107-1114 [doi]
- Understanding the Performance and Challenges of DNS Query Name MinimizationZheng Wang. 1115-1120 [doi]
- Toward a Secure Access to 5G NetworkFuwen Liu, Jin Peng, Min Zuo. 1121-1128 [doi]
- Fast Time Series Discords Detection with Privacy PreservingChunkai Zhang, Ao Yin, Yulin Wu, Yingyang Chen, Xuan Wang. 1129-1139 [doi]
- An Efficient Blacklistable Anonymous Credential System with Reputation Using Pairing-Based AccumulatorToru Nakanishi 0001, Takeshi Kanatani. 1140-1148 [doi]
- Privacy-Preserving Data Synchronization Using Tensor-Based Fully Homomorphic EncryptionKeke Gai, Yulu Wu, Liehuang Zhu, Meikang Qiu. 1149-1156 [doi]
- Towards Domain-Specific and Privacy-Preserving Qualified eID in a User-Centric Identity ModelThomas Lenz, Vesna Krnjic. 1157-1163 [doi]
- RZKPB: A Privacy-Preserving Blockchain-Based Fair Transaction Method for Sharing EconomyBin Li, Yijie Wang. 1164-1169 [doi]
- Towards a User-Friendly and Secure Hand Shaking Authentication for SmartphonesJinpei Yan, Yong Qi, Qifan Rao, Saiyu Qi. 1170-1179 [doi]
- A Flexible Mix-Zone Selection Scheme Towards Trajectory Privacy ProtectionZhenyu Chen, Yanyan Fu, Min Zhang, Zhenfeng Zhang, Hao Li. 1180-1186 [doi]
- PHeDHA: Protecting Healthcare Data in Health Information Exchanges with Active Data BundlesWesam Fadheel, Raed M. Salih, Leszek Lilien. 1187-1195 [doi]
- Monero Ring Attack: Recreating Zero Mixin Transaction EffectDimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu. 1196-1201 [doi]
- PANDORA: Preserving Privacy in PRNU-Based Source Camera AttributionManoranjan Mohanty, Ming Zhang, Muhammad Rizwan Asghar, Giovanni Russello. 1202-1207 [doi]
- Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection NetworksWenjuan Li, Weizhi Meng, Yu Wang, Lam-for Kwok, Rongxing Lu. 1208-1213 [doi]
- Testing Cryptographically Secure Pseudo Random Number Generators with Artificial Neural NetworksTilo Fischer. 1214-1223 [doi]
- IRTED-TL: An Inter-Region Tax Evasion Detection Method Based on Transfer LearningXulyu Zhu, Zheng Yan, Jianfei Ruan, Qinghua Zheng, Bo Dong. 1224-1235 [doi]
- One Intrusion Detection Method Based On Uniformed Conditional Dynamic Mutual InformationLiangfu Lu, Xinhe Zhu, Xuyun Zhang, Junhan Liu, Md. Zakirul Alam Bhuiyan, Guangtai Cui. 1236-1241 [doi]
- Cyber Identity: Salient Trait Ontology and Computational Framework to Aid in Solving CybercrimeMary C. Michel, Marco Carvalho, Heather Crawford, Albert C. Esterline. 1242-1249 [doi]
- Enabling Trust in Deep Learning Models: A Digital Forensics Case StudyAditya K, Slawomir Grzonkowski, Nhien An LeKhac. 1250-1255 [doi]
- Bluetooth Low Energy Used for Memory Acquisition from Smart Health Care DevicesTina Wu, Andrew Martin. 1256-1261 [doi]
- Resilient Bipartite Consensus for Multi-agent Networks with Antagonistic InteractionsHongbin Liu, Ming Xu, Yiming Wu, Ning Zheng 0001, Yuangfang Chen, Md. Zakirul Alam Bhuiyan. 1262-1269 [doi]
- An Efficient Distributed Approach on High Dimensional Data Similarity Searchable EncryptionCheng Guo, Xinyu Tang, Yuanfang Chen, Pengxu Tian, Md. Zakirul Alam Bhuiyan. 1270-1275 [doi]
- Autoblog Forensics and AttributionAaron Koehl. 1276-1286 [doi]
- Managed Blockchain Based Cryptocurrencies with Consensus Enforced Rules and TransparencyPeter Mell. 1287-1296 [doi]
- A Lightweight Path Authentication Protocol for RFID-Based Supply ChainsYuyin Qian, Peng Zeng 0002, Zuming Shen, Kim-Kwang Raymond Choo. 1297-1302 [doi]
- A Blockchain-Based Decentralized Data Storage and Access Framework for PingERSaqib Ali, Guojun Wang, Bebo White, Roger Leslie Cottrell. 1303-1308 [doi]
- Learning and Applying Ontology for Machine Learning in Cyber Attack DetectionHuangjie Zheng, Yuchen Wang, Chen Han, Fangjie Le, Ruan He, Jialiang Lu. 1309-1315 [doi]
- Practical K Nearest Neighbor Query Scheme with Two-Party Guarantees in Road NetworksChangli Zhou, Tian Wang, Wenxian Jiang, Hui Tian. 1316-1321 [doi]
- Privacy-Preserving Method for Temporarily Linking/Revoking Pseudonym Certificates in VANETsMarcos Antonio Simplicio Junior, Eduardo Lopes Cominetti, Harsh Kupwade Patil, Jefferson E. Ricardini, Leonardo T. D. Ferraz, Marcos Vinicius Maciel da Silva. 1322-1329 [doi]
- Blockchain as a Notarization Service for Data Sharing with Personal Data StoreMohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han 0004, Paul Sarda. 1330-1335 [doi]
- Superscalar Encrypted RISC: The Measure of a Secret ComputerPeter T. Breuer, Jonathan P. Bowen, Esther Palomar, Zhiming Liu 0001. 1336-1341 [doi]
- Fair and Transparent Blockchain Based Tendering Framework - A Step Towards Open GovernanceFreya Sheer Hardwick, Raja Naeem Akram, Konstantinos Markantonakis. 1342-1347 [doi]
- Blockchain Versus Database: A Critical AnalysisMohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han 0004, Paul Sarda. 1348-1353 [doi]
- A Privacy-Preserving Principal Component Analysis Outsourcing FrameworkXinBo Liu, Yaping Lin, Qin Liu, Xin Yao 0002. 1354-1359 [doi]
- Detecting Domain Generation Algorithms with Convolutional Neural Language ModelsJi Huang, Pei Wang, Tianning Zang, Qian Qiang, Yipeng Wang, Miao Yu 0006. 1360-1367 [doi]
- FPPB: A Fast and Privacy-Preserving Method Based on the Permissioned Blockchain for Fair Transactions in Sharing EconomyBin Li, Yijie Wang, Peichang Shi, Huan Chen, Li Cheng. 1368-1373 [doi]
- On the Design of a Blockchain-Based System to Facilitate Healthcare Data SharingAnastasia Theodouli, Stelios Arakliotis, Konstantinos Moschou, Konstantinos Votis, Dimitrios Tzovaras. 1374-1379 [doi]
- Consumer Centric Data Control, Tracking and Transparency - A Position PaperJames Tapsell, Raja Naeem Akram, Konstantinos Markantonakis. 1380-1385 [doi]
- Achieving Secure and Effective Search Services in Cloud ComputingQin Liu, Shuyu Pei, Kang Xie, Jie Wu, Tao Peng, Guojun Wang. 1386-1391 [doi]
- Node Immunization in Networks with UncertaintyYizhi Ren, Mengjin Jiang, Ye Yao, Ting Wu, Zhen Wang, Mengkun Li, Kim-Kwang Raymond Choo. 1392-1397 [doi]
- Effective Mobile Web User Fingerprinting via Motion SensorsZhiju Yang, Rui Zhao 0005, Chuan Yue. 1398-1405 [doi]
- Qualified eID Derivation Into a Distributed Ledger Based IdM SystemAndreas Abraham, Kevin Theuermann, Emanuel Kirchengast. 1406-1412 [doi]
- A Hybrid Recommendation Algorithm Based on Heuristic Similarity and Trust MeasureChao Yang, Xinghe Chen, Tingting Song, Bin Jiang, Qin Liu. 1413-1418 [doi]
- SPARQL Multi-Query OptimizationJiaqi Chen, Fan Zhang, Lei Zou. 1419-1425 [doi]
- Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network TrafficFeipeng Yan, Ming Xu, Tong Qiao, Ting Wu, Xue Yang, Ning Zheng 0001, Kim-Kwang Raymond Choo. 1426-1432 [doi]
- Are Your Neighbors Swingers or Kinksters? Feeld App Forensic AnalysisNicholas Mata, Nicole Beebe, Kim-Kwang Raymond Choo. 1433-1439 [doi]
- Browser Analysis of Residual Facebook DataTaylor Cloyd, Trey Osborn, Brian Ellingboe, William Bradley Glisson, Kim-Kwang Raymond Choo. 1440-1445 [doi]
- A Forensic Investigation Framework for Smart Home EnvironmentArnoud Goudbeek, Kim-Kwang Raymond Choo, Nhien-An Le-Khac. 1446-1451 [doi]
- A Co-training Based Hardware Trojan Detection Technique by Exploiting Unlabeled ICs and Inaccurate Simulation ModelsMingfu Xue, Rongzhen Bian, Jian Wang, Weiqiang Liu. 1452-1457 [doi]
- Building Trusted Golden Models-Free Hardware Trojan Detection Framework Against Untrustworthy Testing Parties Using a Novel Clustering Ensemble TechniqueRongzhen Bian, Mingfu Xue, Jian Wang. 1458-1463 [doi]
- A Compact, Lightweight and Low-Cost 8-Bit Datapath AES Circuit for IoT Applications in 28nm CMOSMinyi Lu, Ao Fan, Jiaming Xu, Weiwei Shan. 1464-1469 [doi]
- Differential Power Analysis of 8-Bit Datapath AES for IoT ApplicationsJiaming Xu, Ao Fan, Minyi Lu, Weiwei Shan. 1470-1473 [doi]
- A Power Analysis Attack Countermeasure Based on Random ExecutionShenghua Chen, Wei Ge, Jinjiang Yang, Bo Liu, Jun Yang. 1474-1479 [doi]
- RNS-Based Embedding Scheme for Data Hiding in Digital ImagesYi Yao, Jun Zhou, Bo Yan, Yuqian Li. 1480-1483 [doi]
- Partial Scan Design Against Scan-Based Side Channel AttacksXi Chen, Zhaojun Lu, Gang Qu, Aijiao Cui. 1484-1489 [doi]
- Behavioral Based Trust Metrics and the Smart GridJames Obert, Adrian Chavez, Jay Johnson. 1490-1493 [doi]
- Differential Power Attack on SM4 Block CipherGuoqiang Bai 0001, Hailiang Fu, Wei Li, Xingjun Wu. 1494-1497 [doi]
- Cryptanalysis of a Chaotic Ring Oscillator Based Random Number GeneratorSalih Ergun. 1498-1501 [doi]
- Concepts for Trust Propagation in Knowledge Processing Systems - A Brief Introduction and OverviewMarkus Jäger 0003, Stefan Nadschläger, Josef Küng. 1502-1505 [doi]
- Towards Trustworthy Information Sharing by Creating Cyber Security AlliancesAmeneh Deljoo, Tom M. van Engers, Ralph Koning, Leon Gommans, Cees de Laat. 1506-1510 [doi]
- An Approach of Security Protection for VSAT NetworkZhijun Wu, Qingbo Pan, Meng Yue, Shaopu Ma. 1511-1516 [doi]
- Monitoring of Temperature and Pressure Through Brillouin Optical Sensors for Disasters SystemsAmira Zrelli, Tahar Ezzedine. 1517-1520 [doi]
- An Implementation of Hierarchical Intrusion Detection Systems Using Snort and Federated DatabasesSarvjot kaur Kang, Dale Lindskog, Hamman Samuel. 1521-1525 [doi]
- Low-Cost Energy-Efficient Side-Channel Attacks Resistant AES S-Box with Power-Aware Hiding Inverter in GF(2^4)Chaoqun Yang, Xiangyu Li, Shujuan Yin. 1526-1530 [doi]
- A Novel Identity Authentication for FPGA Based IP DesignsYin Huang, Wei Liang 0005, Jing Long, Jianbo Xu, Kuan-Ching Li. 1531-1536 [doi]
- Detection and Prevention of Routing Attacks in Internet of ThingsSarika Choudhary, Nishtha Kesswani. 1537-1540 [doi]
- Low Delay and Low Cost Audio Surveillance System via a New Optimum FIR Digtal FilterRongxuan Ma, Wei Hu, Yonghao Wang. 1541-1546 [doi]
- UCAM: Usage, Communication and Access Monitoring Based Detection System for IoT BotnetsSyed Muhammad Sajjad, Muhammad Yousaf. 1547-1550 [doi]
- Proposal of Multi-channel Operation Technique Using PingPong256Kihwan Kim, Hoonjae Lee. 1551-1554 [doi]
- A Reversible Data Hiding Scheme with High Security and Improved Embedding CapacityGyan Singh Yadav, Aparajita Ojha. 1555-1559 [doi]
- Behavioral-Based Classification and Identification of Ransomware Variants Using Machine LearningHajredin Daku, Pavol Zavarsky, Yasir Malik. 1560-1564 [doi]
- ALDD: A Hybrid Traffic-User Behavior Detection Method for Application Layer DDoSJianguo Jiang, Qian Yu, Min Yu, Gang Li 0009, Jiuming Chen, Kunying Liu, Chao Liu, Weiqing Huang. 1565-1569 [doi]
- Migrating Data Between Physical Server and Cloud: Improving Accuracy and Data IntegrityMimouna Alkhonaini, Hoda El-Sayed. 1570-1574 [doi]
- OAuth-SSO: A Framework to Secure the OAuth-Based SSO Service for Packaged Web ApplicationsNazmul Hossain, Md. Alam Hossain, Md. Zobayer Hossain, Md. Hasan Imam Sohag, Shawon S. M. Rahman. 1575-1578 [doi]
- Energy Efficiency Analysis of Elliptic Curve Based CryptosystemsTanushree Banerjee, M. Anwar Hasan. 1579-1583 [doi]
- Research on Information Security Perception of Sina Weibo Users Based on KISCAP ModelDaniel Tse, Xuan Weng, Xin Wan, Lan Yao, Wensong Zhang. 1584-1588 [doi]
- Evaluating the Risk Management Plan and Addressing Factors for Successes in Government AgenciesHenry Okonofua, Shawon Rahman. 1589-1592 [doi]
- Hierarchical Polynomial-Based Key Management Scheme in Fog ComputingAshwag Albakri, Mahesh Maddumala, Lein Harn. 1593-1597 [doi]
- Who Would you Like to be Today?: Impersonation by Fake Azure Active Directory Identity FederationNestori Syynimaa. 1598-1604 [doi]
- On the Incremental Digital SignaturesKevin Atighehchi. 1605-1609 [doi]
- Optimized Data de-Identification Using Multidimensional k-AnonymityKai-Cheng Liu, Chuan-Wei Kuo, Wen-Chiuan Liao, Pang-Chieh Wang. 1610-1614 [doi]
- Measuring Personal Privacy Breaches Using Third-Party TrackersErica Shuford, Tara Kavanaugh, Brian Ralph, Ebrima N. Ceesay, Paul Watters. 1615-1618 [doi]
- Quantifying Information Exposure in Internet RoutingPeter Mell, Assane Gueye, Christopher Schanzle. 1619-1623 [doi]
- Malicious Entities are in Vain: Preserving Privacy in Publish and Subscribe SystemsShujie Cui, Sana Belguith, Pramodya De Alwis, Muhammad Rizwan Asghar, Giovanni Russello. 1624-1627 [doi]
- Differentially Private Matrix Completion via Distributed Matrix FactorizationHaotian Zhou, Xiao-Yang Liu, Cai Fu, Chen Shang, Xinyi Chang. 1628-1631 [doi]
- The Challenges of Big Data Governance in HealthcareDaniel Tse, Chung-kin Chow, Ting-pong Ly, Chung-yan Tong, Kwok-wah Tam. 1632-1636 [doi]
- Double-Blind Reputation vs. Intelligent Fake VIP Attacks in Cloud-Assisted InteractionsJerzy Konorski. 1637-1641 [doi]
- Analyzing HTTP-Based Information Exfiltration of Malicious Android ApplicationsSoham Kelkar, Timothy Kraus, Daria Morgan, Junjie Zhang, Rui Dai. 1642-1645 [doi]
- Privacy-Preserving Sensory Data RecoveryCai Chen, Manyuan Zhang, Huanzhi Zhang, Zhenyun Huang, Yong Li. 1646-1650 [doi]
- Detecting Swimming Pools in 15-Minute Load DataSebastian Burkhart, Andreas Unterweger, Günther Eibl, Dominik Engel. 1651-1655 [doi]
- C2R Net: The Coarse to Refined Network for Image Forgery DetectionYang Wei, Xiu-Li Bi, Bin Xiao. 1656-1659 [doi]
- An Adaptive Sliding Window Algorithm for Mining Frequent Itemsets in Computer ForensicsAnping Xiong, Yi Huang, Yunsong Wu, Jun Zhang, Linbo Long. 1660-1663 [doi]
- Towards Privacy-Preserving Forensic Analysis for Time-Series Medical DataXiaoning Liu, Xingliang Yuan, Joseph K. Liu. 1664-1668 [doi]
- The Process of Reverse Engineering GPU Malware and Provide Protection to GPUSYazeed Albabtain, Baijian Yang. 1669-1673 [doi]
- Deduplicated Disk Image Evidence Acquisition and Forensically-Sound ReconstructionXiaoyu Du, Paul Ledwith, Mark Scanlon. 1674-1679 [doi]
- Towards Malware Detection via CPU Power Consumption: Data Collection Design and AnalyticsRobert A. Bridges, Jarilyn Hernández Jiménez, Jeffrey Nichols, Katerina Goseva-Popstojanova, Stacy J. Prowell. 1680-1684 [doi]
- Customized Machine Learning-Based Hardware-Assisted Malware Detection in Embedded DevicesHossein Sayadi, Hosein Mohammadi Makrani, Onkar Randive, Sai Manoj Pudukotai Dinakarrao, Setareh Rafatirad, Houman Homayoun. 1685-1688 [doi]
- The Blockchain for Domain Based Static ShardingHyunKyung Yoo, Jongchoul Yim, Sunme Kim. 1689-1692 [doi]
- A Practical Machine Learning Approach for Dynamic Stock RecommendationHongyang Yang, Xiao-Yang Liu, Qingwei Wu. 1693-1697 [doi]
- A Controllable Efficient Content Distribution Framework Based on Blockchain and ISODATAYangxin Wu, Peijia Zheng, Jianting Guo, Wei Zhang, Jiwu Huang. 1698-1701 [doi]
- A Novel Method for Detecting Image Forgery Based on Convolutional Neural NetworkNa Huang 0002, Jingsha He, Nafei Zhu. 1702-1705 [doi]
- Forensic Analysis of Wear Leveling on Solid-State MediaAshar Neyaz, Narasimha Shashidhar, Umit Karabiyik. 1706-1710 [doi]
- Providing Context-Aware Security for IoT Environments Through Context Sharing FeatureEverton de Matos, Ramão Tiago Tiburski, Leonardo Albernaz Amaral, Fabiano Hessel. 1711-1715 [doi]
- Securing Insulin Pump System Using Deep Learning and Gesture RecognitionUsman Ahmad, Hong Song, Awais Bilal, Shahzad Saleem, Asad Ullah. 1716-1719 [doi]
- Reducing Traffic Congestion for Machine to Machine Type Communication Over 4G-LTE Network by Decreasing Total Bytes TransmittedJitto Joseph, Ron Ruhl, Hamman Samuel. 1720-1721 [doi]
- A Public Key Based EDNS Privacy Tunnel for DNSLanlan Pan, Xuebiao Yuchi, Jian Wang, Anlei Hu. 1722-1724 [doi]
- Anomaly-Based Network Intrusion Detection Model Using Deep Learning in AirportsBehrooz Sezari, Dietmar P. F. Möller, Andreas Deutschmann. 1725-1729 [doi]
- Towards Dynamic and Optimal Big Data PlacementKyriakos Kritikos. 1730-1737 [doi]
- Effective Integration of Geotagged, Ancilliary Longitudinal Survey Datasets to Improve Adulthood Obesity Predictive ModelsSaptashwa Mitra, Yu Qiu, Haley Moss, Kaigang Li, Sangmi Lee Pallickara. 1738-1746 [doi]
- On MapReduce Scheduling in Hadoop Yarn on Heterogeneous ClustersMeng Wang, Chase Q. Wu, Huiyan Cao, Yang Liu, Yongqiang Wang, Aiqin Hou. 1747-1754 [doi]
- Towards a Multi-model Cloud Workflow Resource Monitoring, Adaptation, and PredictionMohamed Adel Serhani, Hadeel T. El Kassabi, Nabeel Al-Qirim, Alramzana Nujum Navaz. 1755-1762 [doi]
- Emotion Artificial Intelligence Derived from Ensemble LearningAnasse Bari, Goktug Saatcioglu. 1763-1770 [doi]
- AMI Smart Meter Big Data Analytics for Time Series of Electricity ConsumptionRashid Mohammad. 1771-1776 [doi]
- An Effective Method to Generate Simulated Attack Data Based on Generative Adversarial NetsHuihui Xie, Kun Lv, Changzhen Hu. 1777-1784 [doi]
- Prediction Algorithm Based on Weather Forecast for Energy-Harvesting Wireless Sensor NetworksHengyi Ren, Jian Guo, Lijuan Sun, Chong Han. 1785-1790 [doi]
- Large Scale and Parallel Sentiment Analysis Based on Label Propagation in Twitter DataYibing Yang, M. Omair Shafiq. 1791-1798 [doi]
- Improved Weighted Label Propagation Algorithm in Social Network ComputingYu Zheng, Yongxin Zhu 0001, Shijin Song, Peng Xiong, Zihao Cao, Junjie Hou. 1799-1803 [doi]
- Reducing Relational Database Performance Bottlenecks Using 3D XPoint Storage TechnologyJinfeng Yang, David J. Lilja. 1804-1808 [doi]
- A Critical Analysis of the V-Model of Big DataAlaa Alsaig, Vangular Alagar, Olga Ormandjieva. 1809-1813 [doi]
- Let me Join Two Worlds! Analyzing the Integration of Web and Native Technologies in Hybrid Mobile AppsShahrooz Pouryousef, Mariam Rezaiee, Ata Chizari. 1814-1819 [doi]
- VeraGreg: A Framework for Verifiable Privacy-Preserving Data AggregationJakub Klemsa, Lukas Kencl, Tomas Vanek. 1820-1825 [doi]
- Obstacles to Implementation of Information Security GovernanceWilliam LIdster, Shawon S. M. Rahman. 1826-1831 [doi]
- A CSI Frequency Domain Fingerprint-Based Method for Passive Indoor Human DetectionQingqing Tan, Chong Han, Lijuan Sun, Jian Guo, Hai Zhu. 1832-1837 [doi]
- Model-Based Trust Assessment for Internet of Things NetworksStephen Adams, Peter A. Beling, Steven Greenspan, Maria Velez-Rojas, Serge Mankovski. 1838-1843 [doi]
- Privacy Preserving Distributed Attribute Computation for Usage Control in the Internet of ThingsGianpiero Costantino, Antonio La Marra, Fabio Martinelli, Paolo Mori, Andrea Saracino. 1844-1851 [doi]
- Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social NetworksAbdur R. Shahid, Niki Pissinou, S. S. Iyengar, Kia Makki. 1852-1857 [doi]
- Blockchain for Fraud Prevention: A Work-History Fraud Prevention SystemPaul Sarda, Mohammad Jabed Morshed Chowdhury, Alan Colman, Muhammad Ashad Kabir, Jun Han 0004. 1858-1863 [doi]
- Improving Email Security with Fuzzy RulesSudarshan Chawathe. 1864-1869 [doi]
- Monitoring Blockchains with Self-Organizing MapsSudarshan Chawathe. 1870-1875 [doi]
- Unauthorized Access Point Detection Using Machine Learning Algorithms for Information ProtectionDoyeon Kim, Dongil Shin, Dongkyoo Shin. 1876-1878 [doi]
- Using Artificial Neurons in Evidence Based Trust ComputationÇiçek Güven, Mike Holenderski, Tanir Özçelebi, Johan Lukkien. 1879-1884 [doi]
- Intrusion-Resilient Classifier Approximation: From Wildcard Matching to Range MembershipGiovanni Di Crescenzo, Lisa Bahler, Brian A. Coan, Kurt Rohloff, Yuriy Polyakov. 1885-1890 [doi]
- Hardware Trojan Detection Utilizing Machine Learning ApproachesKento Hasegawa, Youhua Shi, Nozomu Togawa. 1891-1896 [doi]
- Correlation-Based Electromagnetic Analysis Attack Using Haar Wavelet Reconstruction with Low-Pass Filtering on an FPGA Implementaion of AESAiguo Bu, Wentao Dai, Minyi Lu, Hao Cai, Weiwei Shan. 1897-1900 [doi]
- A New Wavelet Thresholding Method Based on Cyclostationarity for Enhancing the Interception of Computer Video Leakage SignalsJun Shi, Bo Lv, Yangyang Li, Yue Jia, Rui Wang, Yong Liao. 1901-1906 [doi]
- Secure, Decentralized Energy Resource Management Using the Ethereum BlockchainCasimer DeCusatis, Kulvinder Lotay. 1907-1913 [doi]
- Research on Malicious Code Homology Analysis Method Based on Texture Fingerprint ClusteringXiaolin Zhao, Yiman Zhang, Xuhui Li, Quanbao Chen. 1914-1921 [doi]
- Handling Capabilities in Security PoliciesMouslim Tolba, Salem Benferhat, Karim Tabia, Abdelkader Belkhir. 1922-1927 [doi]
- On Mitigation Inefficiency of Selfish Investment in Network Recovery from High Loss SIS InfectionVladimir Marbukh. 1928-1933 [doi]
- SecureCloud: An Encrypted, Scalable Storage for Cloud ForensicsMaximilian Uphoff, Matthäus Wander, Torben Weis, Marian Waltereit. 1934-1941 [doi]
- Cloud Investigations of Illegal IPTV NetworksJohn Sheppard. 1942-1947 [doi]
- Digital Watermarking for Relational Database Security Using mRMR Based Binary Bat AlgorithmHina Tufail, Kashif Zafar, Abdul Rauf Baig. 1948-1954 [doi]
- Cybersecurity: An Analysis of the Protection Mechanisms in a Cloud-centered EnvironmentHenry Okonofua, Shawon S. M. Rahman. 1955-1962 [doi]