A methodology to measure and monitor level of operational effectiveness of a CSOC Ankit ShahRajesh GanesanHasan Cam Regular Contribution 16 February 2017 Pages: 121 - 134
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle Mitsuaki AkiyamaTakeshi YagiYouki Kadobayashi Regular Contribution Open access 30 January 2017 Pages: 135 - 151
Structural analysis and detection of android botnets using machine learning techniques G. KirubavathiR. Anitha Regular Contribution 01 February 2017 Pages: 153 - 167
Using targeted Bayesian network learning for suspect identification in communication networks A. GruberI. Ben-Gal Regular Contribution 08 February 2017 Pages: 169 - 181
Dynamic reversed accumulator Tsung-Min KuoSung-Ming YenMeng-Che Han Regular Contribution 19 January 2017 Pages: 183 - 191
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures Jae Hong SeoKeita EmuraKazuki Yoneyama Regular Contribution 22 March 2017 Pages: 193 - 220
A game-theoretic approach for integrity assurance in resource-bounded systems Aron LaszkaYevgeniy VorobeychikXenofon Koutsoukos Regular Contribution 31 January 2017 Pages: 221 - 242