|
|
|
Processing Social Media Data for Crisis Management in Athena |
|
|
3 | (12) |
|
|
|
Online Surveillance Awareness as Impact on Data Validity for Open-Source Intelligence? |
|
|
15 | (6) |
|
|
|
Improving Cyber Situational Awareness Through Data Mining and Predictive Analytic Techniques |
|
|
21 | (14) |
|
|
|
Detecting Deceit --- Guessing or Assessing? Study on the Applicability of Veracity Assessment Methods in Human Intelligence |
|
|
35 | (15) |
|
|
Human Factors of Social Engineering Attacks (SEAs) in Hybrid Cloud Environment: Threats and Risks |
|
|
50 | (9) |
|
|
|
|
|
|
A Consideration of eDiscovery Technologies for Internal Investigations |
|
|
59 | (15) |
|
|
|
|
Cloud Forensics Challenges Faced by Forensic Investigators |
|
|
74 | (9) |
|
|
|
|
Integrated Computer Forensics Investigation Process Model (ICFIPM) for Computer Crime Investigations |
|
|
83 | (13) |
|
|
|
|
Computer Forensic Analysis of Private Browsing Modes |
|
|
96 | (17) |
|
|
|
|
|
Searching the Web for Illegal Content: The Anatomy of a Semantic Search Engine |
|
|
113 | (10) |
|
|
|
The Enemy Within: The Challenge for Business from Cyber-attack |
|
|
123 | (14) |
|
|
Understanding Privacy Concerns in Online Courses: A Case Study of Proctortrack |
|
|
137 | (14) |
|
|
|
|
|
|
Towards a Common Security and Privacy Requirements Elicitation Methodology |
|
|
151 | (9) |
|
|
|
Automated Security Testing Framework for Detecting SQL Injection Vulnerability in Web Application |
|
|
160 | (12) |
|
|
|
A Survey on Financial Botnets Threat |
|
|
172 | (10) |
|
|
|
Wavelet Based Image Enlargement Technique |
|
|
182 | (7) |
|
|
|
Understanding Android Security |
|
|
189 | (11) |
|
|
|
Gender Impact on Information Security in the Arab World |
|
|
200 | (11) |
|
|
|
Systems Security, Safety and Sustainability |
|
|
|
Some Security Perils of Smart Living: (A Day in the Life of John Q Smith, a Citizen of Utopia, and His Twin Brother, Who Isn't) |
|
|
211 | (17) |
|
|
An Analysis of Honeypot Programs and the Attack Data Collected |
|
|
228 | (11) |
|
|
|
An Immunity Based Configuration for Multilayer Single Featured Biometric Authentication Algorithms |
|
|
239 | (5) |
|
|
Sergio Tenreiro de Magalhaes |
|
|
|
Security and Feasibility of Power Line Communication System |
|
|
244 | (8) |
|
|
|
|
|
A Comparison Study for Different Wireless Sensor Network Protocols |
|
|
252 | (11) |
|
|
|
Security Audit, Risk and Governance |
|
|
|
Responsive Cyber-Physical Risk Management (RECYPHR): A Systems Framework |
|
|
263 | (12) |
|
|
|
|
Risk and Privacy Issues of Digital Oil Fields in the Cloud |
|
|
275 | (10) |
|
|
|
|
Simulation of Cloud Data Security Processes and Performance |
|
|
285 | (11) |
|
|
|
|
A Framework for Cloud Security Audit |
|
|
296 | (17) |
|
|
|
|
Secure Software Engineering |
|
|
|
Software Security Requirements Engineering: State of the Art |
|
|
313 | (10) |
|
|
Conflicts Between Security and Privacy Measures in Software Requirements Engineering |
|
|
323 | (12) |
|
|
|
Saeed Malekshahi Gheytassi |
|
|
|
Securing the Blind User Visualization and Interaction in Touch Screen |
|
|
335 | (13) |
|
|
|
Behavioural Biometrics: Utilizing Eye-Tracking to Generate a Behavioural Pin Using the Eyewriter |
|
|
348 | (13) |
|
Author Index |
|
361 | |