+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Volume 9, Issue 1, February 2019 (BibTex)
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

Letter from the Editor-in-Chief
Ilsun You

Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality
Shingo Sato, Shoichi Hirose, and Junji Shikata

Know Your EK: A Content and Workflow Analysis Approach for Exploit Kits
Emre Suren and Pelin Angin

Efficient Android Malware Detection Using API Rank and Machine Learning
Jaemin Jung, Hyunjin Kim, Seong-je Cho, Sangchul Han, and Kyoungwon Suh
[abstract

Automatic Blocking Mechanism for Information Security with SDN
Yi-Chih Kao, Jui-Chun Liu, You-Hong Wang, Yu-Huang Chu, Shi-Chun Tsai, and Yi-Bing Lin
[abstract

[Goto Archives]