Andre Calero-Valdez, Carsten Roecker, and Martina Ziefle Semantic-Aware Mashups for Personal Resources in SemanticLIFE, 138 Sao-Khue Vo, Amin Anjomshoaa, and A. Min Tjoa 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, 2014. ,
Jara Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters, p.166 ,
Audun Jøsang, and Christophe Rosenberger Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices ,
A Efficient Data Anonymization Tool Based on Scoring Functions, 211 Shinsaku Kiyomoto and Yutaka Miyake Detection of Malicious Web Pages Using System Calls Sequences . . . . . . . 226 ,
Corrado Aaron Visaggio Risk Reduction Overview: A Visualization Method for Risk Management, p.239 ,
Diederik Theobald Sessink Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime Function, p.250 ,
and Ilsun You Amplification DDoS Attacks: Emerging Threats and Defense Strategies, p.298 ,