Malware analysis using visualized images and entropy graphs Kyoung Soo HanJae Hyun LimEul Gyu Im Regular Contribution 29 April 2014 Pages: 1 - 14
The MALICIA dataset: identification and analysis of drive-by download operations Antonio NappaM. Zubair RafiqueJuan Caballero Regular Contribution 21 June 2014 Pages: 15 - 33
Routing management for performance and security tradeoff in wireless mesh networks Helber SilvaAldri SantosMichele Nogueira Regular contribution 30 May 2014 Pages: 35 - 46
Modeling runtime enforcement with mandatory results automata Egor DolzhenkoJay LigattiSrikar Reddy Regular Contribution 24 April 2014 Pages: 47 - 60
A multiresolution approach for optimal defense against random attacks Michael ValenzuelaFerenc SzidarovszkyJerzy Rozenblit Regular Contribution 25 May 2014 Pages: 61 - 72
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model Rafael TonicelliAnderson C. A. NascimentoAkira Otsuka Regular Contribution 15 June 2014 Pages: 73 - 84
Implementing public-key cryptography on passive RFID tags is practical Alex ArbitYoel LivneAvishai Wool Regular Contribution 11 April 2014 Pages: 85 - 99