Stateful Data Usage Control for Android Mobile Devices Aliaksandr LazouskiFabio MartinelliAndrea Saracino Regular Contribution 17 June 2016 Pages: 345 - 369
ADroid: anomaly-based detection of malicious events in Android platforms A. Ruiz-HerasP. García-TeodoroL. Sánchez-Casado Regular Contribution 03 June 2016 Pages: 371 - 384
Network-based detection of Android malicious apps Shree GargSateesh K. PeddojuAnil K. Sarje Regular Contribution 01 August 2016 Pages: 385 - 400
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection Constantinos KoliasVasilis KoliasGeorgios Kambourakis Regular Contribution 18 June 2016 Pages: 401 - 416
HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms Raghav V. SampangiSrinivas Sampalli Regular Contribution 06 July 2016 Pages: 417 - 433
Designing vulnerability testing tools for web services: approach, components, and tools Nuno AntunesMarco Vieira Regular Contribution 14 June 2016 Pages: 435 - 457