Ausgabe 2/2018
Inhalt (7 Artikel)
Regular Contribution
A methodology to measure and monitor level of operational effectiveness of a CSOC
Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam
Open Access
Regular Contribution
HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle
Mitsuaki Akiyama, Takeshi Yagi, Takeo Hariu, Youki Kadobayashi
Regular Contribution
Structural analysis and detection of android botnets using machine learning techniques
G. Kirubavathi, R. Anitha
Regular Contribution
Using targeted Bayesian network learning for suspect identification in communication networks
A. Gruber, I. Ben-Gal
Regular Contribution
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures
Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama
Regular Contribution
A game-theoretic approach for integrity assurance in resource-bounded systems
Aron Laszka, Yevgeniy Vorobeychik, Xenofon Koutsoukos