On the architecture and development life cycle of secure cyber-physical systems Cong SunJianfeng MaQingsong Yao Review paper 27 April 2017 Pages: 1 - 21
Towards privacy-preserving user targeting Jinghua JiangYifeng ZhengXiaolin Gui Review paper 27 April 2017 Pages: 22 - 32
Position based key exchange: defnitions and implementations Junwei ZhangFangqiong DuChao Yang Review paper 27 April 2017 Pages: 33 - 43
Securing acoustics-based short-range communication systems: an overview Si ChenZhan QinKui Ren Review paper 27 April 2017 Pages: 44 - 51
Secure searchable encryption: a survey Yunling WangJianfeng WangXiaofeng Chen Review paper 27 April 2017 Pages: 52 - 65
A survey of routing techniques for satellite networks Xiaogang QiJiulong MaShaolin Hu Review paper 27 April 2017 Pages: 66 - 85
A survey of privacy protection techniques for mobile devices Lei ZhangDonglai ZhuMin Yang Review paper 27 April 2017 Pages: 86 - 92
Smart data deduplication for telehealth systems in heterogeneous cloud computing Keke GaiMeikang QiuHui Zhao Research paper 27 April 2017 Pages: 93 - 104
Analysis of SVEIR worm attack model with saturated incidence and partial immunization Fangwei WangWenyan HuangChangguang Wang Research paper 27 April 2017 Pages: 105 - 115
Towards energy efficient cloud: an optimized ant colony model for virtual machine placement Liumei ZhangYichuan WangWenjiang Ji Research paper 27 April 2017 Pages: 116 - 132
A multi-step attack-correlation method with privacy protection Yongtang ZhangXianlu LuoHaibo Luo Research paper 27 April 2017 Pages: 133 - 142
Game strategies for distributed denial of service defense in the Cloud of Things Yichuan WangYefei ZhangWeigang Ma Correspondence letter 27 April 2017 Pages: 143 - 155