+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Volume 4, Issue 4, November 2014 (BibTex)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Visual Analytics of E-mail Sociolinguistics for User Behavioural Analysis                                                          
Philip Legg, Oliver Buckley, Michael Goldsmith, and Sadie Creese
[abstract]

A Grid System Detecting Internal Malicious Behaviors at System Call Level
Fang-Yie Leu and Yi-Ting Hsiao

Open Source Software Detection using Function-level Static Software Birthmark
Dongjin Kim, Seong-je Cho, Sangchul Han, Minkyu Park, and Ilsun You

Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm
Jaecheol Ha, Yongje Choi, Dooho Choi, and Hoonjae Lee

A Cooperative Trust Bit-Map Routing Protocol Using the GA Algorithm 
for Reducing the Damages from the InTs in WANETs
Hsing-Chung Chen and Hui-Kai Su

A Method for Hiding Link Layer Addresses Using Bloom Filter in Wireless Sensor Networks
Sangho Park, Jihyun Bang, Mirim Ahn, Woomin Lee, and Taekyoung Kwon

Face Recognition Performance Comparison of Fake Faces with Real Faces in Relation to Lighting
Mi-Young Cho and Young-Sook Jeong

Integrated Data Model Development Framework for the Architecture Descriptions
Mye Sohn, Saerom Kang, and Hyun Jung Lee 

Malware Similarity Analysis using API Sequence Alignments
In Kyeom Cho, TaeGuen Kim, Yu Jin Shim, Haeryong Park, Bomin Choi, and Eul Gyu Im

Multiple Device Login Attacks and Countermeasures of Mobile VoIP Apps on Android
Su Wan Park and Jeong Hyun Yi

Towards a User and Role-based Sequential Behavioural Analysis Tool for Insider Threat Detection
Ioannis Agrafiotis, Philip Legg, Michael Goldsmith, and Sadie Creese

[Goto Archives]