| Issue | Title | |
| Vol 2, No 2 (2013): SCIENCE | A Conjunction, Language, and System Facets for Private Packet Filtering | Abstract PDF |
| Michael Oehler, Dhananjay S. Phatak, Alan T. Sherman | ||
| Vol 1, No 4 (2012): SCIENCE | A Formal Model of LoA Elevation in Online Trust | Abstract PDF |
| Hiroyuki Sato | ||
| Vol 2, No 1 (2013): SCIENCE | A Novel Framework on Data Network Reduction | Abstract PDF |
| Justin Zhan, Xing Fang, Nicholas Koceja | ||
| Vol 1, No 1 (2012): SCIENCE | A Process For Visualizing Disordered Molecular Data with a Case Study in Bulk Water | Abstract PDF |
| Nick Leaf, Kwan-Liu Ma, Cui Zhang, Giulia Galli | ||
| Vol 2, No 3 (2013): SCIENCE | Access Control Policy Identification and Extraction from Project Documentation | Abstract PDF |
| John Slankas, Laurie Williams | ||
| Vol 1, No 4 (2012): SCIENCE | An Interative Association Rule Mining Technique to K-Anonymize a Dataset | Abstract PDF |
| Michael Hayes, Miriam A.M. Capretz, Jeff Reed, Cheryl Forchuk | ||
| Vol 1, No 2 (2012): SCIENCE | Analyzing Malware Detection Eciency with Multiple Anti-Malware Programs | Abstract PDF |
| Jose Andre Morales, Shouhuai Xu, Ravi Sandhu | ||
| Vol 1, No 3 (2012): SCIENCE | Automatic Click Fraud Detection in Web Advertisement | Abstract |
| Rattikorn Hewett, Abhishek Agarwal | ||
| Vol 1, No 2 (2012): SCIENCE | Collaborative Filtering as an Investigative Tool for Peer-to-Peer Filesharing Networks | Abstract PDF |
| Matthew Edwards, Awais Rashid | ||
| Vol 2, No 3 (2013): SCIENCE | Constraints Specication in Attribute Based Access Control | Abstract PDF |
| Khalid Zaman Bijon, Ram Krishman, Ravi Sandhu | ||
| Vol 2, No 4 (2013): SCIENCE | Controlling Break-The-Glass Through Alignment | Abstract PDF |
| Arya Adriansyah, Boudewijn F. van Dongen, Nicola Zannone | ||
| Vol 1, No 2 (2012): SCIENCE | Crime Pays If You Are Just an Average Hacker | Abstract PDF |
| Woohyun Shim, Luca Allodi, Fabio Massacci | ||
| Vol 1, No 4 (2012): SCIENCE | CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud Computing | Abstract PDF |
| Satyajeet Nimgaonkar, Srujan Kotikela, Mahadevan Gomathisankaran | ||
| Vol 1, No 2 (2012): SCIENCE | Cyber-Security for the Controller Area Network (CAN) Communication Protocol | Abstract PDF |
| Chung-Wei Lin, Alberto Sangiovanni-Vincentelli | ||
| Vol 2, No 3 (2013): SCIENCE | Design and Implementation of Access Control as a Service for IaaS Cloud | Abstract PDF |
| Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi, Haiyong Xie | ||
| Vol 1, No 3 (2012): SCIENCE | Discovering Unknown Cyber Attacks Using Contextual Misuse and Anomaly Detection | Abstract PDF |
| Ahmed Aleroud, George Karabatis | ||
| Vol 1, No 1 (2012): SCIENCE | GPU-Optimized Coarse-Grained MD Simulations of Protein and RNA Folding and Assembly | Abstract PDF |
| Andrew J. Proctor, Tyson J. Lipscomb, Anqi Zou, Joshua A. Anderson, Samuel S. Cho | ||
| Vol 2, No 1 (2013): SCIENCE | Impact of Non-linear Pay-Off Functions on Pairwise Stable Collaborative Oligopolies | Abstract PDF |
| Shaun Lichter, Christopher Griffin, Terry Friesz | ||
| Vol 2, No 2 (2013): SCIENCE | Impact of Privacy Awareness on Attitudes and Behaviors Online | Abstract PDF |
| Delfina Malandrino, Vittorio Scarano, Raffaele Spinelli | ||
| Vol 1, No 1 (2012): SCIENCE | Mathematical-Computational-Electronic Model of MPTP-induced Parkinsonism | Abstract PDF |
| Daniela Jaramillo Raquejo | ||
| Vol 1, No 1 (2012): SCIENCE | Medical Image Diagnosis of Liver Cancer by Hybrid Feedback GMDH-type Neural Network using Heuristic Self-Organization | Abstract PDF |
| Tadashi Kondo, Junji Ueno, Schoichiro Takao | ||
| Vol 2, No 2 (2013): SCIENCE | Model-Driven Development of Information Flow-Secure Systems with IFlow | Abstract PDF |
| Kuzman Katkalov, Kurt Stenzel, Marian Borek, Wolfgang Reif | ||
| Vol 2, No 1 (2013): SCIENCE | Rating Equity Funds against Return of Random Traders | Abstract PDF |
| Ta-Wei Hung, Mu-En Wu, Hsueh-I Lu, Jan-Ming Ho | ||
| Vol 2, No 2 (2013): SCIENCE | Respecting User Privacy in Mobile Crowdsourcing | Abstract PDF |
| Yang Wang, Yun Huang, Claudia Louis | ||
| Vol 2, No 4 (2013): SCIENCE | SmartPay: A Lightweight Protocol to Enforce Trust Preferences in Mobile Person-to-Person Payments | Abstract PDF |
| Barbara Carminati, Elena Ferrari, Ngoc Hong Tran | ||
| 1 - 25 of 31 Items | 1 2 > >> | |