Volume 39

2

Breaking and fixing the Android Launching Flow

Year:
2013
Language:
english
File:
PDF, 980 KB
english, 2013
3

Covert communications through network configuration messages

Year:
2013
Language:
english
File:
PDF, 1.36 MB
english, 2013
5

Gait and activity recognition using commercial phones

Year:
2013
Language:
english
File:
PDF, 728 KB
english, 2013
8

SHADuDT: Secure hypervisor-based anomaly detection using danger theory

Year:
2013
Language:
english
File:
PDF, 3.02 MB
english, 2013
15

Co-operative user identity verification using an Authentication Aura

Year:
2013
Language:
english
File:
PDF, 4.36 MB
english, 2013
16

Caller-REP: Detecting unwanted calls with caller social strength

Year:
2013
Language:
english
File:
PDF, 3.70 MB
english, 2013
17

Usage control in SIP-based multimedia delivery

Year:
2013
Language:
english
File:
PDF, 1.59 MB
english, 2013
23

Inference attacks against trust-based onion routing: Trust degree to the rescue

Year:
2013
Language:
english
File:
PDF, 1.63 MB
english, 2013
25

A framework for risk assessment in access control systems

Year:
2013
Language:
english
File:
PDF, 415 KB
english, 2013
26

Contents

Year:
2013
Language:
english
File:
PDF, 63 KB
english, 2013
27

Editorial Board

Year:
2013
Language:
english
File:
PDF, 49 KB
english, 2013
28

Editorial

Year:
2013
Language:
english
File:
PDF, 122 KB
english, 2013
30

CISOs and organisational culture: Their own worst enemy?

Year:
2013
Language:
english
File:
PDF, 455 KB
english, 2013
31

Dual-use open source security software in organizations – Dilemma: Help or hinder?

Year:
2013
Language:
english
File:
PDF, 640 KB
english, 2013
33

An adaptive risk management and access control framework to mitigate insider threats

Year:
2013
Language:
english
File:
PDF, 2.01 MB
english, 2013
34

A framework for continuous, transparent mobile device authentication

Year:
2013
Language:
english
File:
PDF, 1.08 MB
english, 2013
35

Editorial Board

Year:
2013
Language:
english
File:
PDF, 49 KB
english, 2013
37

Contents

Year:
2013
Language:
english
File:
PDF, 73 KB
english, 2013
38

Deriving common malware behavior through graph clustering

Year:
2013
Language:
english
File:
PDF, 595 KB
english, 2013
40

Analysis of dictionary methods for PIN selection

Year:
2013
Language:
english
File:
PDF, 828 KB
english, 2013