• A Hypervisor Level Provenance System to Reconstruct Attack Story Caused by Kernel Malware

  • VaultIME: Regaining User Control for Password Managers Through Auto-Correction

  • An On-Demand Defense Scheme Against DNS Cache Poisoning Attacks

  • A Framework for Formal Analysis of Privacy on SSO Protocols

  • : An Access Control Model for Social Networks with Translucent User Provenance

  • WebAD: A Cascading Model Based on Machine Learning for Web Attacks Detection

  • Situational Crime Prevention and the Mitigation of Cloud Computing Threats

  • Hiding Fast Flux Botnet in Plain Email Sight

  • Cyber Security Decision Support for Remediation in Automated Computer Network Defence

  • Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks

  • Possible Keyloggers Without Implementing a Keyboard in Android

  • Exploring Secure Communication in VANET Broadcasting

  • SecControl: Bridging the Gap Between Security Tools and SDN Controllers

  • An Effective Approach for Dealing with the Pressure to Compromise Security During Systems Development

  • Securing Websites Against Homograph Attacks

  • Privacy Threat Analysis of Mobile Social Network Data Publishing

  • Fast and Robust Biometric Authentication Scheme Using Human Ear

  • Identification of Forensic Artifacts in VMWare Virtualized Computing

  • Manipulating the Five V’s in the Next Generation Air Transportation System

  • Sensitive Data in Smartphone Applications: Where Does It Go? Can It Be Intercepted?

  • Fault-Tolerant and Scalable Key Management Protocol for IoT-Based Collaborative Groups

  • SAFEDroid: Using Structural Features for Detecting Android Malwares

  • Securing Healthcare Data Using Biometric Authentication

  • Privacy in Social Media

  • A New Cyber Security Framework Towards Secure Data Communication for Unmanned Aerial Vehicle (UAV)