Benchmarks for Evaluating Anomaly Based Intrusion Detection Solutions Nicholas J. Miller and Mehrdad Aliasgari, California State University Long Beach, USA
The Effect of Information Technology Using Enterprise Security Risk Management Michael O. Adekanye and Shawon S. M. Rahman, University of Hawaii-Hilo, USA
A Tiered Blockchain Framework for Vehicular Forensics Marcel C. Ugwu1, Izunna U. Okpala2, Collins I. Oham3 and Cosmas I. Nwakanma3, 1Seamfix Nigeria Limited, Nigeria, 2National Institute for Nigerian Languages, Nigeria and 3Federal University of Technology, Nigeria
Mining Patterns of Sequential Malicious APIs to Detect Malware Abdurrahman Pektas1, Elif Nurdan Pektas2 and Tankut Acarman1, 1Galatasaray University, Turkey and 2Siemens - Turkey, Turkey
A Method for Encrypting and Decrypting Wave Files Mohamad M. Al-laham, Mohamad a. Mai'iteh, Hasan Rashaideh and Ziad Al-Qadi, Al-Balqa Applied University, Jordan
The (In)Security of Topology Discovery in Openflow-Based Software Defined Network Talal Alharbi, Marius Portmann and Farzaneh Pakzad, The University of Queensland, Australia
Symmetric Key Management Scheme for Hierarchical Wireless Sensor Networks Mohammed A. Al-taha and Ra'ad A. Muhajjar, Basrah University, Iraq
Low Area FPGA Implementation of DROM-CSLA-QTL Architecture for Cryptographic Applications Shailaja A1 and Krishnamurthy G N2, 1VTU-RRC, India and 2BNM Institute of Technology, India
A Novel Approach of Image Steganography for Secret Communication Using Spacing Method Wa'el Ibrahim A. Almazaydeh1, H.S.Sheshadri1 and S.K.Padma2, 1P.E.S. College of Engineering, India and 2Sri Jayachamarajendra College of Engineering, India
Unconstrained Endpoint Security System : UEPTSS Fatema Bannat Wala and Chase Cotton, University of Delaware, USA
VANET Security and Privacy - An Overview Marvy B. Mansour1, Cherif Salama2, Hoda K. Mohamed3 and Sherif A. Hammad4, 1British University in Egypt, Egypt, 2,3Ain Shams University, Egypt and 4Avelabs, Germany