All Stories

  1. Identifying Fraudulent Users in E-commerce Applications through Spatiotemporal Fusion and Selective Aggregation
  2. HandID: Towards Unobtrusive Gesture-independent User Authentication on Smartphones Using Vibration-based Hand Biometrics
  3. Towards behavior-independent in-hand user authentication on smartphone using vibration
  4. Federated learning and protection of user privacy
  5. Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage
  6. Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals
  7. Confidentiality-Preserving Publicly Verifiable Computation Schemes for Polynomial Evaluation and Matrix-Vector Multiplication
  8. Biometrics Based Privacy-Preserving Authentication and Mobile Template Protection
  9. A target image-oriented dictionary learning-based method for fully automated latent fingerprint forensic
  10. Content-based multi-source encrypted image retrieval in clouds with privacy preservation
  11. A novel statistical technique for intrusion detection systems
  12. Continuous Authentication Using Eye Movement Response of Implicit Visual Stimuli
  13. A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems
  14. Securing Mobile Healthcare Data: A Smart Card Based Cancelable Finger-Vein Bio-Cryptosystem
  15. Motion Flow Clustering for Moving Vehicle Detection from Satellite High Definition Video
  16. State estimation for a TCP/IP network using terminal sliding-mode methodology
  17. Preserving transaction privacy in bitcoin
  18. A new binary hybrid particle swarm optimization with wavelet mutation
  19. Efficient object proposals extraction for target detection in VHR remote sensing images
  20. Preface: Security and privacy in big data clouds
  21. Privacy-preserving identity-based file sharing in smart city
  22. Design of Alignment-Free Cancelable Fingerprint Templates with Zoned Minutia Pairs
  23. New secure healthcare system using cloud of things
  24. Distributed Segment-Based Anomaly Detection With Kullback–Leibler Divergence in Wireless Sensor Networks
  25. Identity-Based Data Outsourcing with Comprehensive Auditing in Clouds
  26. BROSMAP: A Novel Broadcast Based Secure Mobile Agent Protocol for Distributed Service Applications
  27. Enhanced Locality-Sensitive Hashing for Fingerprint Forensics over Large Multi-sensor Databases
  28. Key negotiation schemes for body sensor networks on the surface of the human body
  29. Security in Computing and Communications
  30. A partial Hadamard transform approach to the design of cancelable fingerprint templates containing binary biometric representations
  31. Detecting Anomalous Behavior in Cloud Servers by Nested Arc Hidden SEMI-Markov Model with State Summarization
  32. Cloud-Based Approximate Constrained Shortest Distance Queries over Encrypted Graphs with Privacy Protection
  33. Vulnerability analysis of iPhone 6
  34. Continuous authentication using EEG and face images for trusted autonomous systems
  35. Using game theory with intrinsic motivation to examine anti-hacking policies for autonomous systems
  36. Direct Feature Point Correspondence Discovery for Multiview Images: An Alternative Solution When SIFT-Based Matching Fails
  37. Threshold attribute-based signcryption and its application to authenticated key agreement
  38. Secure searches in the cloud: A survey
  39. FE-SViT
  40. Privacy-Preserving Access to Big Data in the Cloud
  41. Energy Big Data Analytics and Security: Challenges and Opportunities
  42. A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
  43. Windows Based Data Sets for Evaluation of Robustness of Host Based Intrusion Detection Systems (IDS) to Zero-Day and Stealth Attacks
  44. Security and privacy in Internet of things: methods, architectures, and solutions
  45. A blind system identification approach to cancelable fingerprint templates
  46. Contactless fingerprint enhancement via intrinsic image decomposition and guided image filtering
  47. A robust multi-constrained model for fingerprint orientation field construction
  48. Sliding-mode observers for real-time DDoS detection
  49. Physiological-signal-based key negotiation protocols for body sensor networks: A survey
  50. A Security-Enhanced Alignment-Free Fuzzy Vault-Based Fingerprint Cryptosystem Using Pair-Polar Minutiae Structures
  51. Comparative studies of router-based observation schemes for anomaly detection in TCP/UDP networks
  52. A survey of network anomaly detection techniques
  53. Identity-Based Group Encryption
  54. A General Communication Cost Optimization Framework for Big Data Stream Processing in Geo-Distributed Data Centers
  55. Threshold Attribute-Based Signcryption in Standard Model
  56. Integer Data Zero-Watermark Assisted System Calls Abstraction and Normalization for Host Based Anomaly Detection Systems
  57. Superpixel-Based Graphical Model for Remote Sensing Image Mapping
  58. SOLS: A scheme for outsourced location based service
  59. Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
  60. Impact of trivial quantisation on discrimination power in biometric systems
  61. Partial fingerprint indexing: a combination of local and reconstructed global features
  62. A New Biocryptosystem-Oriented Security Analysis Framework and Implementation of Multibiometric Cryptosystems Based on Decision Level Fusion
  63. Emergency data gathering with buffer constraint in actuator-based wireless sensor networks
  64. Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems
  65. Distributed power control with double-layer Stackelberg game and utility learning in cooperative relay networks
  66. A Voronoi neighbor structure-based fingerprint cryptosystem using minutiae descriptors and error-correcting codes
  67. HCSF: A hierarchical clustering algorithm based on swarm intelligence and fuzzy logic for ciphertext search
  68. Physiological-Signal-Based Key Negotiation Protocols for Body Sensor Networks: A Survey
  69. A Cloud Security Assessment System Based on Classifying and Grading
  70. A fast terminal sliding mode observer for TCP/IP network anomaly traffic detection
  71. A Trusted Mobile Payment Scheme Based on Body Area Networks
  72. Issues with Multimodal Biometric Systems
  73. Segment-Based Anomaly Detection with Approximated Sample Covariance Matrix in Wireless Sensor Networks
  74. An Active Cooperation-Aware Spectrum Allocation Mechanism for Body Sensor Networks
  75. Camera motion estimation through monocular normal flow vectors
  76. Securing Body Sensor Networks with Biometric Methods: A New Key Negotiation Method and a Key Sampling Method for Linear Interpolation Encryption
  77. Collaborative Wireless Sensor Networks and Applications
  78. Multi-objective Based Fuzzy Mathematical Programming Model for Green Logistics Network Design Under Uncertainty
  79. A Multistaged Automatic Restoration of Noisy Microscopy Cell Images
  80. Multi-constrained Orientation Field Modeling and Its Application for Fingerprint Indexing
  81. A Reputation Revision Method Based on the Credibility for Cloud Services
  82. A new Lagrange solution to the privacy-preserving general geometric intersection problem
  83. Special issue on “quality of service in wireless and mobile networking”
  84. Enhancing Big Data Security with Collaborative Intrusion Detection
  85. A statistical framework for intrusion detection system
  86. A benchmark 3D fingerprint database
  87. Reliable Bulk-Data Dissemination in Delay Tolerant Networks
  88. The effect of spurious and missing minutiae on delaunay triangulation based on its application to fingerprint authentication
  89. A survey: Error control methods used in bio-cryptography
  90. Evaluating host-based anomaly detection systems: Application of the one-class SVM algorithm to ADFA-LD
  91. Optional multi-biometric cryptosystem based on fuzzy extractor
  92. Security and privacy in internet of things: methods, architectures, and solutions
  93. Distributed collision control with the integration of packet size for congestion control in wireless sensor networks
  94. 3D Fingerprint
  95. A Delaunay Quadrangle-Based Fingerprint Authentication System With Template Protection Using Topology Code for Local Registration and Security Enhancement
  96. Taxonomy of Attacks for Agent-Based Smart Grids
  97. Computer Intrusion Detection Systems
  98. A hierarchical clustering method for big data oriented ciphertext search
  99. An alignment-free fingerprint bio-cryptosystem based on modified Voronoi neighbor structures
  100. Design of alignment-free cancelable fingerprint templates via curtailed circular convolution
  101. Fingerprint Indexing Based on Combination of Novel Minutiae Triplet Features
  102. Energy-Efficient Cooperative Communications for Multimedia Applications in Multi-Channel Wireless Networks
  103. Evaluating Host-Based Anomaly Detection Systems: Application of the Frequency-Based Algorithms to ADFA-LD
  104. A general transformation from KP-ABE to searchable encryption
  105. Outlier Detection
  106. A Delaunay triangle group based fuzzy vault with cancellability
  107. A Hadamard transform-based method for the design of cancellable fingerprint templates
  108. Evaluating host-based anomaly detection systems: A preliminary analysis of ADFA-LD
  109. Genetic Algorithm for distorted point set matching
  110. Top-k future system call prediction based multi-module anomaly detection system
  111. Performance evaluation of 2D to 3D fingerprint recognition
  112. Biometrics for securing mobile payments: Benefits, challenges and solutions
  113. A Key Management Scheme between Body Sensor Networks and the Base Station
  114. An Energy Efficient Key Management Scheme for Body Sensor Networks
  115. Scalable Hypergrid k-NN-Based Online Anomaly Detection in Wireless Sensor Networks
  116. A multi-module anomaly detection scheme based on system call prediction
  117. Attacks via record multiplicity on cancelable biometrics templates
  118. Cooperative multi-target tracking in passive sensor-based networks
  119. Generation of a new IDS test dataset: Time to retire the KDD collection
  120. A hierarchical pea-based anomaly detection model
  121. Partial Fingerprint Reconstruction with Improved Smooth Extension
  122. A Finger-Vein Based Cancellable Bio-cryptosystem
  123. Cancelable Fingerprint Templates with Delaunay Triangle-Based Local Structures
  124. Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach
  125. Using incremental subspace and contour template for object tracking
  126. A New Dimensionality Reduction Algorithm for Hyperspectral Image Using Evolutionary Strategy
  127. NDTC: A novel topology-based fingerprint matching algorithm using N-layer Delaunay triangulation net check
  128. A Real-Time NetFlow-based Intrusion Detection System with Improved BBNN and High-Frequency Field Programmable Gate Arrays
  129. Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Networks
  130. Hashed Random Key Pre-distribution Scheme for Large Heterogeneous Sensor Networks
  131. A Delaunay Triangle-Based Fuzzy Extractor for Fingerprint Authentication
  132. Free Search with Adaptive Differential Evolution Exploitation and Quantum-Inspired Exploration
  133. Network Security
  134. Special section: Green computing
  135. Lifetime optimization for reliable broadcast and multicast in wirelessad hocnetworks
  136. Preface of the “Workshop on computational intelligence and cyber security”
  137. High-Order Terminal Sliding-Mode Observers for Anomaly Detection
  138. A Hash Chains Based Key Management Scheme for Wireless Sensor Networks
  139. A General Transformation from KP-ABE to Searchable Encryption
  140. On the Effectiveness of Relaxation Theory for Controlling High Traffic Volumes in Body Sensor Networks
  141. A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern Recognition
  142. Terminal sliding mode observer for anomaly detection in TCP/IP networks
  143. Pair-polar coordinate-based cancelable fingerprint templates
  144. Guest Editorial
  145. Foreword from the Conference Chairs
  146. BIOMETRIC AUTHENTICATION FOR MOBILE COMPUTING APPLICATIONS
  147. Mobile device access control: an improved correlation based face authentication scheme and its Java ME application
  148. Bio-cryptographic Key Generation
  149. Editorial: Advances in network and system security
  150. Fingerprint Template Protection
  151. Compatibility of photographed images with touch-based fingerprint verification software
  152. Pseudo random data stream generation for data/images protection in ubiquitous computing environment
  153. An alignment free fingerprint fuzzy extractor using near-equivalent Dual Layer Structure Check (NeDLSC) algorithm
  154. Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system
  155. Blind channel estimation for single-input multiple-output OFDM systems: zero padding based or cyclic prefix based?
  156. Biometric security for mobile computing
  157. Global Ridge Orientation Modeling for Partial Fingerprint Identification
  158. A frequency domain subspace blind channel estimation method for trailing zero OFDM systems
  159. A mutual-healing key distribution scheme in wireless sensor networks
  160. The Exploration of Network Coding in IEEE 802.15.4 Networks
  161. A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment
  162. Biomentric Fingerprint Template
  163. A pitfall in fingerprint features extraction
  164. A hybrid public key infrastructure solution (HPKI) for HIPAA privacy/security regulations
  165. Performance Analysis of Optimal Packet Size for Congestion Control in Wireless Sensor Networks
  166. Critical infrastructure protection: Resource efficient sampling to improve detection of less frequent patterns in network traffic
  167. A correlation based face verification scheme designed for mobile device access control: From algorithm to Java ME implementation
  168. Highly efficient one-time pad key generation for large volume medical data protection
  169. Biometrics Security and Cryptography
  170. ECG-Based Authentication
  171. Intranet Security via Firewalls
  172. Host-Based Anomaly Intrusion Detection
  173. Network Traffic Analysis and SCADA Security
  174. A program-based anomaly intrusion detection scheme using multiple detection engines and fuzzy inference
  175. A pixel-based scrambling scheme for digital medical images protection
  176. Dual Layer Structure Check (DLSC) fingerprint verification scheme designed for biometric mobile template protection
  177. Building a SCADA Security Testbed
  178. An Efficient Mobile Voting System Security Scheme Based on Elliptic Curve Cryptography
  179. A simple and efficient hidden Markov model scheme for host-based anomaly intrusion detection
  180. Rotation estimation of singular points using analytical models
  181. Security in Online Games
  182. Taxonomy and Framework for Integrating Dependability and Security
  183. On Multiscroll Chaotic Attractors in Hysteresis-Based Piecewise-Linear Systems
  184. Investigating Correlation-Based Fingerprint Authentication Schemes for Mobile Devices Using the J2ME technology
  185. A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing
  186. Chaotic Cryptography
  187. Enhanced gradient-based algorithm for the estimation of fingerprint orientation fields
  188. NXG03-3: Enhancements for RTT-Fair HighSpeed TCP
  189. A Biometric Encryption Approach Incorporating Fingerprint Indexing in Key Generation
  190. A Novel Hybrid Crypto-Biometric Authentication Scheme for ATM Based Banking Applications
  191. Modelling of SACK TCP and application to the HTTP file transfer environment
  192. Systematic H∞ weighting function selection and its application to the real-time control of a vertical take-off aircraft
  193. Mobile Ad Hoc Networks
  194. Mobile Ad Hoc Networks
  195. Simplifying discrete-time H/sup ∞/ control
  196. A Framework for Distributed Key Management Schemes in Heterogeneous Wireless Sensor Networks
  197. A Gradient Based Weighted Averaging Method for Estimation of Fingerprint Orientation Fields
  198. Analytic models for highspeed TCP fairness analysis
  199. Simulation study of TCP performance under IPv4 within integrated wired and wireless networks
  200. Conjugation and H/sup ∞/ control of discrete-time systems
  201. Robust performance control and analysis of ill-conditioned plants
  202. DSP application in e-commerce security
  203. A note on an analytic model for slow start in TCP
  204. A multi-layer model for anomaly intrusion detection using program sequences of system calls
  205. PPN 2007 PC Co-chairs’ Message
  206. A statistics based design of MAC protocols with distributed collision resolution for ad hoc networks
  207. Wireless Interactive Teaching by Using Keypad-Based ARS
  208. Wireless Interactive Teaching by Using Keypad-Based ARS