Abstract is missing.
- Fortifying TripAdvisor against reputation-system attacksFrancesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera. 20-21 [doi]
- Data privacy preserving scheme in MANETsBhawani Shanker Bhati, Pallapa Venkataram. 22-23 [doi]
- Controls for protecting critical information infrastructure from cyberattacksTamir Tsegaye, Stephen Flowerday. 24-29 [doi]
- Fingerprint templates generated by the fractional fourier, cosine and sine transforms and their generation conditionsHiroyuki Yoshimura. 30-34 [doi]
- Information security in a public safety, participatory crowdsourcing smart city projectLiezel Cilliers, Stephen Flowerday. 36-41 [doi]
- Computer forensic analisys of some web attacksNatasa Suteva, Aleksandra Mileva, Mario Loleski. 42-47 [doi]
- Deanonymisation in Linked Data: A research roadmapDalal Al-Azizy, David E. Millard, Nigel Shadbolt, Kieron O'Hara. 48-52 [doi]
- Preventing document leakage through active documentZeyad S. Aaber, Richard M. Crowder, Nawfal F. Fadhel, Gary B. Wills. 53-58 [doi]
- Online Behavioral Advertising (OBA) with privacy protectionNihar Vuppalapati, Joon S. Park. 60-65 [doi]
- A review and comparative evaluation of forensics guidelines of NIST SP 800-101 Rev.1: 2014 and ISO/IEC 27037: 2012Akinola Ajijola, Pavol Zavarsky, Ron Ruhl. 66-73 [doi]
- Symbol diversification of linux binariesSamuel Laurén, Petteri Mäki, Sampsa Rauti, Shohreh Hosseinzadeh, Sami Hyrynsalmi, Ville Leppänen. 74-79 [doi]
- The risk relationship between trust and information sharing in automotive supply chainsRoxanne Piderit, Stephen Flowerday. 80-85 [doi]
- A critical review of attack scenarios on the IAEA Technical Guidance NSS 17 Computer Security at Nuclear FacilitiesPryde N. Sema, Pavol Zavarsky, Ron Ruhl. 87-90 [doi]
- Component for 3D printing provenance framework: Security properties components for provenance frameworkNawfal F. Fadhel, Richard M. Crowder, Fatimah Y. Akeel, Gary B. Wills. 91-96 [doi]
- Anomaly detection system: Towards a framework for enterprise log management of security servicesOmer Ozulku, Nawfal F. Fadhel, David Argles, Gary B. Wills. 97-102 [doi]