Cluster Head Election in Wireless Sensor Networks
Sara Elrefaay, Marianne Azer and Nashwa Abdelbaki
Towards Secure End-to-End Data Aggregation in AMI through Delayed-Integrity-Verification
Sye Loong Keoh and Zhaohui Tang
ETC: Effective Trustworthy Communication with Two-mode Authentication for Disaster Recovery
Tanapat Ruengsatra, Kulit Na Nakorn, Kultida Rojviboonchai and Krerk Piromsopa
TWalker: An Efficient Taint Analysis Tool
Jinxin Ma ,Puhan Zhang, Guowei Dong, Shuai Shao and Jiangxiao Zhang
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Erwan Godefroy, Eric Totel, Michel Hurfin and Frederic Majorczyk
Passive Video Forgery Detection Techniques: A Survey
Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Mohd. Yamani Idna Idris, Suleman Khan, Zaidi Razak and Muhammad Rezal Kamel Ariffin
Improving Web Application Firewalls to Detect Advanced SQL Injection Attacks
Abdelhamid Makiou, Youcef BEGRICHE and Ahmed SERHROUCHNI
Optimization of Excerpt Query Process for Packet Attribution System
Shesha Shila Bharadwaj Renukuntla and Shatrunjay Rawat
Security assurance of local data stored by HTML5 web application
Mayssa Jemel and Ahmed Serhrouchni
Context-Aware Intrusion Alerts Verification Approach
Sherif Saad, Issa Traore and Marcelo Brocardo
A Novel Psychovisual Model on An Independent Video Frame for Almost Lossless Compression
Nur Azman Abu and Muhammad Rezal Kamel Ariffin
Secure firmware architecture using virtual hard disks
Jaebum Sim and Jungchan Na
An Experimental Study on Firewall Performance
Chenghong Wang, Donghong Zhang, Hualin Lu, Jing Zhao, Zhenyu Zhang and Zheng Zheng
Extraction method of Region of Interest from hand palm: Application with contactless and touchable devices
Artabaz Saliha, Benatchba Karima, Koudil Mouloud, Dellys Hachemi Nabil, and Bouridane Ahmed