Security in Computing and Communications: 7th International Symposium, SSCC 2019, Trivandrum, India, December 18–21, 2019, Revised Selected Papers

This book constitutes the refereed proceedings of the 7th International Symposium on Security in Computing and Communications, SSCC 2019, held in Trivandrum, India, in December 2019. The 22 revised full papers and 7 revised short papers presented were carefully reviewed and selected from 61 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.

[1]  Yih Huang,et al.  Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services , 2011, Moving Target Defense.

[2]  Wei-Kuei Chen,et al.  Image sharing method for gray-level images , 2013, J. Syst. Softw..

[3]  Ingrid Verbauwhede,et al.  The communication and computation cost of wireless security: extended abstract , 2011, WiSec '11.

[4]  Ching-Nung Yang,et al.  Improvements of image sharing with steganography and authentication , 2007, J. Syst. Softw..

[5]  Angelos D. Keromytis,et al.  Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.

[6]  Alejandro Alvaro Ramírez-Acosta,et al.  Optimized robust multi-sensor scheme for simultaneous video and image iris recognition , 2018, Pattern Recognit. Lett..

[7]  Christopher Krügel,et al.  A quantitative study of accuracy in system call-based malware detection , 2012, ISSTA 2012.

[8]  Michele Nappi,et al.  Multibiometric score-level fusion through optimization and training , 2019, 2019 3rd International Conference on Bio-engineering for Smart Technologies (BioSMART).

[9]  Paul J. Werbos,et al.  Backpropagation Through Time: What It Does and How to Do It , 1990, Proc. IEEE.

[10]  Paulo Shakarian,et al.  Early Warnings of Cyber Threats in Online Discussions , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).

[11]  Huy Hoang Ngo,et al.  Dynamic Key Cryptography and Applications , 2010, Int. J. Netw. Secur..

[12]  Steve J. Chapin,et al.  Address-space layout randomization using code islands , 2009, J. Comput. Secur..

[13]  Lester S. Hill Cryptography in An Algebraic Alphabet , 1929 .

[14]  Waleed Al-Nuaimy,et al.  Real-time Detection of Wearable Camera Motion Using Optical Flow , 2018, 2018 IEEE Congress on Evolutionary Computation (CEC).

[15]  Elisa Bertino,et al.  Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks , 2013, NSS.

[16]  Yee Wei Law,et al.  Assessing Security-Critical Energy-Efficient Sensor Networks , 2002 .

[17]  Ayumu Kubota,et al.  Detecting and Preventing Drive-By Download Attack via Participative Monitoring of the Web , 2013, 2013 Eighth Asia Joint Conference on Information Security.

[18]  Syam Kumar Pasupuleti,et al.  A new verifiable outsourced ciphertext-policy attribute based encryption for big data privacy and access control in cloud , 2018, Journal of Ambient Intelligence and Humanized Computing.

[19]  Colin Ware,et al.  Information Visualization: Perception for Design , 2000 .

[20]  Jian Zhang,et al.  Classification of Android apps and malware using deep neural networks , 2017, 2017 International Joint Conference on Neural Networks (IJCNN).

[21]  Meenakshi Sharma,et al.  A Hybrid Cryptosystem approach for file security by using merging mechanism , 2016, 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[22]  Shahram Rahimi,et al.  Domino-Effect Free Crash Recovery for Concurrent Failures in Cluster Federation , 2008, GPC.

[23]  Manoj Kumar AN EFFICIENT RECOVERY MECHANISM WITH CHECKPOINTING APPROACH FOR CLUSTER FEDERATION , 2014 .

[24]  Tao Zhang,et al.  Reducing energy consumption of mobile phones during data transmission and encryption for wireless body area network applications , 2015, Secur. Commun. Networks.

[25]  Win Zaw,et al.  Permission-Based Android Malware Detection , 2013 .

[26]  Ibrahim Marouf,et al.  INVESTIGATION STUDY OF FEASIBLE PRIME NUMBER TESTING ALGORITHMS , 2017 .

[27]  Ching-Nung Yang,et al.  Improving recovered image quality in secret image sharing by simple modular arithmetic , 2018, Signal Process. Image Commun..

[28]  Xiaohu Tang,et al.  Achieving Efficient and Privacy-Preserving Multi-Domain Big Data Deduplication in Cloud , 2018, IEEE Transactions on Services Computing.

[29]  Hannes Holm,et al.  An expert-based investigation of the Common Vulnerability Scoring System , 2015, Comput. Secur..

[30]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[31]  Parviz Keshavarzi,et al.  Advance hybrid key management architecture for SCADA network security , 2016, Secur. Commun. Networks.

[32]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[33]  M. Curty,et al.  Secure quantum key distribution , 2014, Nature Photonics.

[34]  K. P. Soman,et al.  Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS) , 2017, Int. J. Inf. Syst. Model. Des..

[35]  Claudia Eckert,et al.  Deep Learning for Classification of Malware System Call Sequences , 2016, Australasian Conference on Artificial Intelligence.

[36]  Yoshua Bengio,et al.  Greedy Layer-Wise Training of Deep Networks , 2006, NIPS.

[37]  Srivaths Ravi,et al.  System design methodologies for a wireless security processing platform , 2002, DAC '02.

[38]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[39]  Yan Grunenberger,et al.  The Cost of the "S" in HTTPS , 2014, CoNEXT.

[40]  Jani Suomalainen,et al.  Secure inspection of web transactions , 2012 .

[41]  Sushil Jajodia,et al.  Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks , 2016, DBSec.

[42]  Manindra Agrawal Primality Tests Based on Fermat's Little Theorem , 2006, ICDCN.

[43]  Yiguo Qiao,et al.  Anomaly intrusion detection method based on HMM , 2002 .

[44]  J. Stone Cyber War Will Take Place! , 2013 .

[45]  Ahmad Al Badawi,et al.  Frequency Analysis of 32-bit Modular Divider Based on Extended GCD Algorithm for Different FPGA chips , 2018 .

[46]  V Jyothsna,et al.  A Review of Anomaly based Intrusion Detection Systems , 2011 .

[47]  Monther Aldwairi,et al.  MALURLs: Malicious URLs Classification System , 2011 .

[48]  Samhaa R. El-Beltagy,et al.  A Fully Automated Approach for Arabic Slang Lexicon Extraction from Microblogs , 2014, CICLing.

[49]  M. Abdullah-Al-Wadud,et al.  Directional Age-Primitive Pattern (DAPP) for Human Age Group Recognition and Age Estimation , 2017, IEEE Transactions on Information Forensics and Security.

[50]  Vinod Kumar,et al.  Signature Based Intrusion Detection System Using SNORT , 2012 .

[51]  Janani Kalyanam,et al.  Solution to Detect, Classify, and Report Illicit Online Marketing and Sales of Controlled Substances via Twitter: Using Machine Learning and Web Forensics to Combat Digital Opioid Access , 2018, Journal of medical Internet research.

[52]  Monther Aldwairi,et al.  Anomaly Payload Signature Generation System Based on Efficient Tokenization Methodology , 2018 .

[53]  Fei Su,et al.  Joint multi-feature fusion and attribute relationships for facial attribute prediction , 2017, 2017 IEEE Visual Communications and Image Processing (VCIP).

[54]  Hugo Proença,et al.  UBEAR: A dataset of ear images captured on-the-move in uncontrolled conditions , 2011, 2011 IEEE Workshop on Computational Intelligence in Biometrics and Identity Management (CIBIM).

[55]  Jan Almäng,et al.  War, vagueness and hybrid war , 2019, Defence Studies.

[56]  Hai Jin,et al.  A hybrid ranking approach to estimate vulnerability for dynamic attacks , 2011, Comput. Math. Appl..

[57]  Rama Chellappa,et al.  HyperFace: A Deep Multi-Task Learning Framework for Face Detection, Landmark Localization, Pose Estimation, and Gender Recognition , 2019, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[58]  Ville Leppänen,et al.  A Survey on Fake Entities as a Method to Detect and Monitor Malicious Activity , 2017, 2017 25th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP).

[59]  E. Keren,et al.  Encryption of pictures and shapes by random grids. , 1987, Optics letters.

[60]  Panganamala Ramana Kumar,et al.  Dynamic Watermarking: Active Defense of Networked Cyber–Physical Systems , 2016, Proceedings of the IEEE.

[61]  Robert König,et al.  Universally Composable Privacy Amplification Against Quantum Adversaries , 2004, TCC.

[62]  Wei-Yang Lin,et al.  Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..

[63]  Sushil Jajodia,et al.  k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities , 2014, IEEE Transactions on Dependable and Secure Computing.

[64]  Arun Venkataramani,et al.  Energy consumption in mobile phones: a measurement study and implications for network applications , 2009, IMC '09.

[65]  S. Ishmukhametov,et al.  On practical aspects of the Miller-Rabin Primality Test , 2013 .

[66]  B. Buchanan,et al.  Attributing Cyber Attacks , 2015 .

[67]  Ali A. Ghorbani,et al.  A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.

[68]  Mark Stamp,et al.  Introduction to Machine Learning with Applications in Information Security , 2017 .

[69]  Yoshua Bengio,et al.  Learning Phrase Representations using RNN Encoder–Decoder for Statistical Machine Translation , 2014, EMNLP.

[70]  Xiaofeng Chen,et al.  Secure Distributed Deduplication Systems with Improved Reliability , 2015, IEEE Trans. Computers.

[71]  Ivan Stojmenovic,et al.  The Fog computing paradigm: Scenarios and security issues , 2014, 2014 Federated Conference on Computer Science and Information Systems.

[72]  Behnam Dezfouli,et al.  Energy and Processing Demand Analysis of TLS Protocol in Internet of Things Applications , 2018, 2018 IEEE International Workshop on Signal Processing Systems (SiPS).

[73]  Zahra Moravej,et al.  Secure SCADA communication by using a modified key management scheme. , 2013, ISA transactions.

[74]  Corrado Ronchi,et al.  Hardened Client Platforms for Secure Internet Banking , 2008, ISSE.

[75]  Milos Drutarovský,et al.  True Random Number Generator Embedded in Reconfigurable Hardware , 2002, CHES.

[76]  Robert J. Bunker FIVE-DIMENSIONAL (CYBER) WARFIGHTING: CAN THE ARMY AFTER NEXT BE DEFEATED THROUGH COMPLEX CONCEPTS AND TECHNOLOGIES? , 1998 .

[77]  Muhammad Abdul-Mageed,et al.  SANA: A Large Scale Multi-Genre, Multi-Dialect Lexicon for Arabic Subjectivity and Sentiment Analysis , 2014, LREC.

[78]  Muhammad Abdul-Mageed,et al.  SAMAR: A System for Subjectivity and Sentiment Analysis of Arabic Social Media , 2012, WASSA@ACL.

[79]  Shahram Rahimi,et al.  A Novel Recovery Approach for Cluster Federations , 2007, GPC.

[80]  Luc Van Gool,et al.  Random Forests for Real Time 3D Face Analysis , 2012, International Journal of Computer Vision.

[81]  Mahdi Abadi,et al.  DbDHunter: An ensemble-based anomaly detection approach to detect drive-by download attacks , 2015, 2015 5th International Conference on Computer and Knowledge Engineering (ICCKE).

[82]  Per Larsen,et al.  SoK: Automated Software Diversity , 2014, 2014 IEEE Symposium on Security and Privacy.

[83]  Hsinchun Chen,et al.  Sentiment analysis in multiple languages: Feature selection for opinion classification in Web forums , 2008, TOIS.

[84]  Nathan Clarke,et al.  Advanced facial recognition for digital forensics , 2018 .

[85]  Siu-Ming Yiu,et al.  A multi-task learning model for malware classification with useful file access pattern from API call sequence , 2016, ArXiv.

[86]  Tom M. Mitchell,et al.  Weakly Supervised Extraction of Computer Security Events from Twitter , 2015, WWW.

[87]  Mohammed H. Almeshekah,et al.  Planning and Integrating Deception into Computer Security Defenses , 2014, NSPW '14.

[88]  Reza Malekian,et al.  The hybrid encryption algorithm of lightweight data in cloud storage , 2016, 2016 2nd International Symposium on Agent, Multi-Agent Systems and Robotics (ISAMSR).

[89]  Ahmad Firdaus Ahmad Fadzil,et al.  Comprehensive Performance Assessment on Open Source Intrusion Detection System , 2019 .

[90]  Ali Dehghantanha,et al.  Machine learning aided Android malware classification , 2017, Comput. Electr. Eng..

[91]  Frederick B. Cohen,et al.  Operating system protection through program evolution , 1993, Comput. Secur..

[92]  George R. S. Weir,et al.  From ZeuS to Zitmo: Trends in Banking Malware , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[93]  Shahram Rahimi,et al.  Novel Crash Recovery Approach for Concurrent Failures in Cluster Federation , 2009, GPC.

[94]  Parviz Keshavarzi,et al.  Key management issue in SCADA networks: A review , 2017 .

[95]  Bing Qi,et al.  Practical challenges in quantum key distribution , 2016, npj Quantum Information.

[96]  M. Weber,et al.  Politics as a Vocation , 1919, Princeton Readings in Political Thought.

[97]  P. S. Avadhani,et al.  A Comparison of Two Intrusion Detection Systems , 2013 .

[98]  Zhibin Zhou,et al.  Efficient and secure data storage operations for mobile cloud computing , 2012, 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm).

[99]  Mohammed Al-Kabi,et al.  Evaluating social context in arabic opinion mining , 2018, Int. Arab J. Inf. Technol..

[100]  Debbie W. Leung,et al.  The Universal Composable Security of Quantum Key Distribution , 2004, TCC.

[101]  Andrew Smith,et al.  Public support for facial recognition via police body-worn cameras: Findings from a list experiment , 2020, Gov. Inf. Q..

[102]  Riccardo Distasi,et al.  MUBIDUS-I: A multibiometric and multipurpose dataset , 2019, 2019 15th International Conference on Signal-Image Technology & Internet-Based Systems (SITIS).

[103]  Srivaths Ravi,et al.  Optimizing public-key encryption for wireless clients , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[104]  Karsten Brauer Authentication and security aspects in an international multi-user network , 2011 .

[105]  Miguel Morales-Sandoval,et al.  Energy and Area Costs of Lightweight Cryptographic Algorithms for Authenticated Encryption in WSN , 2018, Secur. Commun. Networks.

[106]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[107]  Zhiyuan Zheng,et al.  Towards Improving Data Validity of Cyber-Physical Systems through Path Redundancy , 2017, CPSS@AsiaCCS.

[108]  Audun Jøsang,et al.  DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking , 2016, CCS.

[109]  Monther Aldwairi,et al.  MALURLS: A Lightweight Malicious Website Classification Based on URL Features , 2012 .

[110]  Brent Byunghoon Kang,et al.  POLaR: Per-Allocation Object Layout Randomization , 2019, 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).

[111]  Elena Dubrova,et al.  A List of Maximum Period NLFSRs , 2012, IACR Cryptol. ePrint Arch..

[112]  Pete Burnap,et al.  A Supervised Intrusion Detection System for Smart Home IoT Devices , 2019, IEEE Internet of Things Journal.

[113]  Neil C. Rowe,et al.  A Realistic Experimental Comparison of the Suricata and Snort Intrusion-Detection Systems , 2012, 2012 26th International Conference on Advanced Information Networking and Applications Workshops.

[114]  F. Xavier Roca,et al.  Age and gender recognition in the wild with deep attention , 2017, Pattern Recognit..

[115]  Tudor Dumitras,et al.  Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits , 2015, USENIX Security Symposium.

[116]  Xiaohui Liang,et al.  SPFM: Scalable and Privacy-Preserving Friend Matching in Mobile Cloud , 2017, IEEE Internet of Things Journal.

[117]  Ville Leppänen,et al.  Diversifying SQL to Prevent Injection Attacks , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[118]  Ian H. Witten,et al.  WEKA: a machine learning workbench , 1994, Proceedings of ANZIIS '94 - Australian New Zealnd Intelligent Information Systems Conference.

[119]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[120]  Somesh Jha,et al.  Automated generation and analysis of attack graphs , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.

[121]  Michael Schatz,et al.  Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.

[122]  Susan Elias,et al.  Multiview gait-based gender classification through pose-based voting , 2019, Pattern Recognit. Lett..

[123]  Dacheng Tao,et al.  Trunk-Branch Ensemble Convolutional Neural Networks for Video-Based Face Recognition , 2016, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[124]  Sushil Jajodia,et al.  Proactive Defense Through Deception , 2019 .

[125]  Yoshua Bengio,et al.  A Neural Probabilistic Language Model , 2003, J. Mach. Learn. Res..

[126]  Jari-Matti Mäkelä,et al.  Preventing malicious attacks by diversifying Linux shell commands , 2015, SPLST.

[127]  Richard A. Clarke,et al.  Cyber War: The Next Threat to National Security and What to Do About It , 2010 .

[128]  Sang-Uk Shin,et al.  Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage , 2019, Wirel. Commun. Mob. Comput..

[129]  Jeppe Teglskov Jacobsen,et al.  The cyberwar mirage and the utility of cyberattacks in war: How to make real use of Clausewitz in the age of cyberspace , 2014 .

[130]  Gaili Yue,et al.  Face Recognition Based on Histogram Equalization and Convolution Neural Network , 2018, 2018 10th International Conference on Intelligent Human-Machine Systems and Cybernetics (IHMSC).

[131]  Madhavi Latha Makkena,et al.  Face Recognition and Human Tracking Using GMM, HOG and SVM in Surveillance Videos , 2017, Annals of Data Science.

[132]  Eric Medvet,et al.  Detecting Android malware using sequences of system calls , 2015, DeMobile@SIGSOFT FSE.

[133]  Gordon Fyodor Lyon,et al.  Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning , 2009 .

[134]  Chih-Hsien Hsia,et al.  Lossless progressive secret sharing for grayscale and color images , 2019, Multimedia Tools and Applications.

[135]  Berk Sunar,et al.  A Provably Secure True Random Number Generator with Built-In Tolerance to Active Attacks , 2007, IEEE Transactions on Computers.

[136]  Yannick Abanda,et al.  Image encryption by chaos mixing , 2016, IET Image Process..

[137]  Arun Kumar Sangaiah,et al.  Android malware detection based on system call sequences and LSTM , 2019, Multimedia Tools and Applications.

[138]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[139]  Jack W. Stokes,et al.  Large-scale malware classification using random projections and neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[140]  Monther Aldwairi,et al.  Switch architecture for optical burst switching networks , 2015 .

[141]  Simone Atzeni,et al.  Evaluation of Android Malware Detection Based on System Calls , 2016, IWSPA@CODASPY.

[142]  Ashok Kumar Mohan,et al.  An Investigation on HTTP/2 Security , 2018, J. Cyber Secur. Mobil..

[143]  Mounir Ghogho,et al.  Deep learning approach for Network Intrusion Detection in Software Defined Networking , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).

[144]  Gang Wang,et al.  Crowdsourcing Cybersecurity: Cyber Attack Detection using Social Media , 2017, CIKM.

[145]  Xingquan Zhu,et al.  Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.

[146]  Al-Sakib Khan Pathan,et al.  Checkpointing distributed computing systems: an optimisation approach , 2019 .

[147]  M. Ståhlberg THE TROJAN MONEY SPINNER , 2007 .

[148]  R. Ito,et al.  Image Size Invariant Visual Cryptography , 1999 .

[149]  Masato Koashi,et al.  Simple security proof of quantum key distribution based on complementarity , 2009 .

[150]  Hiroshi Ishii,et al.  Automated Detection of Drive-By Download Attack , 2015, 2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[151]  Alessandro Trifiletti,et al.  A High-Speed Oscillator-Based Truly Random Number Source for Cryptographic Applications on a Smart Card IC , 2003, IEEE Trans. Computers.

[152]  François-Xavier Standaert,et al.  On the Energy Cost of Communication and Cryptography in Wireless Sensor Networks , 2008, 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications.

[153]  Muhammad Abdul-Mageed,et al.  AWATIF: A Multi-Genre Corpus for Modern Standard Arabic Subjectivity and Sentiment Analysis , 2012, LREC.

[154]  Roberto Peon,et al.  HPACK: Header Compression for HTTP/2 , 2015, RFC.

[155]  Karen A. Scarfone,et al.  A Complete Guide to the Common Vulnerability Scoring System Version 2.0 | NIST , 2007 .

[156]  Per Larsen,et al.  Security through Diversity: Are We There Yet? , 2014, IEEE Security & Privacy.

[157]  Dennis Andriesse,et al.  An Analysis of the Zeus Peer-to-Peer Protocol , 2014 .

[158]  Simon W. Moore,et al.  The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators , 2009, CHES.

[159]  Golden G. Richard,et al.  Detecting objective-C malware through memory forensics , 2016 .

[160]  Ji Xiang,et al.  Towards Fine-Grained Access Control on Browser Extensions , 2012, ISPEC.

[161]  Lei Liu,et al.  Chrome Extensions: Threat Analysis and Countermeasures , 2012, NDSS.

[162]  Michael Welzl,et al.  Can SPDY really make the web faster? , 2014, 2014 IFIP Networking Conference.

[163]  Sellami Ali,et al.  DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .

[164]  Christine Morin,et al.  A hierarchical checkpointing protocol for parallel applications in cluster federations , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[165]  Chik How Tan,et al.  Analysis and Enhancement of Random Number Generator in FPGA Based on Oscillator Rings , 2008, 2008 International Conference on Reconfigurable Computing and FPGAs.

[166]  Markus Jakobsson,et al.  Mutual Authentication for Low-Power Mobile Devices , 2002, Financial Cryptography.

[167]  Abdelmgeid Amin Ali,et al.  Image Steganography Technique By Using Braille Method of Blind People (LSBraille) , 2013 .

[168]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[169]  Zhuo Lu,et al.  Cyber Deception: Overview and the Road Ahead , 2018, IEEE Security & Privacy.

[170]  Michele Nappi,et al.  Gender classification on 2D human skeleton , 2019, 2019 3rd International Conference on Bio-engineering for Smart Technologies (BioSMART).

[171]  Nattakant Utakrit Review of Browser Extensions, a Man-in-the-Browser Phishing Techniques Targeting Bank Customers , 2009 .

[172]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[173]  S. A. Alyamkin,et al.  Age Recognition from Facial Images using Convolutional Neural Networks , 2019, Optoelectronics, Instrumentation and Data Processing.

[174]  Shyi-Ming Chen,et al.  Drive-by Disclosure: A Large-Scale Detector of Drive-by Downloads Based on Latent Behavior Prediction , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[175]  Guodong Guo,et al.  A survey on deep learning based face recognition , 2019, Comput. Vis. Image Underst..

[176]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[177]  Antonio Ruiz-Martínez,et al.  Systematic literature review on the state of the art and future research work in anonymous communications systems , 2017, Comput. Electr. Eng..

[178]  Anne E. James,et al.  Network Intrusion Detection Systems in High-Speed Traffic in Computer Networks , 2013, 2013 IEEE 10th International Conference on e-Business Engineering.

[179]  Sushil Jajodia,et al.  Exploring steganography: Seeing the unseen , 1998, Computer.

[180]  Jürgen Schmidhuber,et al.  Long Short-Term Memory , 1997, Neural Computation.

[181]  Marvin Theimer,et al.  Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.

[182]  Anjula Gupta,et al.  Cryptography Algorithms: A Review , 2014 .

[183]  Qasem Abu Al-Haija,et al.  A Systematic Expository Review of Schmidt-Samoa Cryptosystem , 2018 .

[184]  Dawn Song,et al.  Mitigating buffer overflows by operating system randomization , 2002 .

[185]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[186]  Mihir Bellare,et al.  Message-Locked Encryption and Secure Deduplication , 2013, EUROCRYPT.

[187]  L. Alvisi,et al.  A Survey of Rollback-Recovery Protocols , 2002 .

[188]  Damian Kacperski,et al.  COMPACT: Biometric Dataset of Face Images Acquired in Uncontrolled Indoor Environment , 2019, Comput. Sci..

[189]  Tzung-Her Chen,et al.  Threshold visual secret sharing by random grids , 2011, J. Syst. Softw..

[190]  By Olivia A. Garard,et al.  Clausewitzian Alchemy and the Modern Character of War , 2019, Orbis.

[191]  Christine Morin,et al.  Hybrid checkpointing for parallel applications in cluster federations , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[192]  Pabak Indu,et al.  Hiding Data in Text using ASCII Mapping Technology (AMT) , 2013 .

[193]  Nathan Danneman,et al.  Social Media Mining with R , 2014 .

[194]  Witawas Srisa-an,et al.  Significant Permission Identification for Machine-Learning-Based Android Malware Detection , 2018, IEEE Transactions on Industrial Informatics.

[195]  Timothy W. Finin,et al.  CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities , 2016, 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[196]  Lior Rokach,et al.  Generic Black-Box End-to-End Attack against RNNs and Other API Calls Based Malware Classifiers , 2017, ArXiv.

[197]  Young-Chang Hou,et al.  Goal-programming-assisted visual cryptography method with unexpanded shadow images for general access structures , 2006 .

[198]  Srinivas Devadas,et al.  FPGA-Based True Random Number Generation Using Circuit Metastability with Adaptive Feedback Control , 2011, CHES.

[199]  Ching-Nung Yang,et al.  New visual secret sharing schemes using probabilistic method , 2004, Pattern Recognit. Lett..

[200]  Thomas Hardjono,et al.  Security in Wireless LANs and MANs , 2005 .

[201]  Mihir Bellare,et al.  DupLESS: Server-Aided Encryption for Deduplicated Storage , 2013, USENIX Security Symposium.

[202]  Swarup Bhunia,et al.  Hardware Trojan: Threats and emerging solutions , 2009, 2009 IEEE International High Level Design Validation and Test Workshop.

[203]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[204]  Qasem Abu Al-Haija,et al.  Radix-8 Design Alternatives of Fast Two Operands Interleaved Multiplication with Enhanced Architecture , 2019 .

[205]  Yan Yan,et al.  Multi-label learning based deep transfer neural network for facial attribute classification , 2018, Pattern Recognit..

[206]  Vincenzo A. Sainato,et al.  Cyber War Will Not Take Place , 2012 .

[207]  Wenjia Li,et al.  Detecting Malware for Android Platform: An SVM-Based Approach , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.

[208]  Samee Ullah Khan,et al.  > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < 1 , 2008 .

[209]  Shyong Jian Shyu,et al.  Image encryption by multiple random grids , 2009, Pattern Recognit..

[210]  Georgios Kambourakis,et al.  The Mirai botnet and the IoT Zombie Armies , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[211]  Maria Rigaki,et al.  Adversarial deep learning against intrusion detection classifiers , 2017 .

[212]  Monther Aldwairi,et al.  Detecting Fake News in Social Media Networks , 2018, EUSPN/ICTH.

[213]  Hannes Holm,et al.  Baltic Cyber Shield : Research from a Red Team versus Blue Team Exercise , 2012 .

[214]  Yi-Chun Yeh,et al.  BrowserGuard: A Behavior-Based Solution to Drive-by-Download Attacks , 2011, IEEE Journal on Selected Areas in Communications.

[215]  Igor Santos,et al.  Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying , 2015, Log. J. IGPL.

[216]  Duncan S. Wong,et al.  Mutual authentication and key exchange for low power wireless communications , 2001, 2001 MILCOM Proceedings Communications for Network-Centric Operations: Creating the Information Force (Cat. No.01CH37277).

[217]  Ahmad-Reza Sadeghi,et al.  On the (In)Security of Mobile Two-Factor Authentication , 2014, Financial Cryptography.

[218]  Andreas Pfitzmann,et al.  Attacks on Steganographic Systems , 1999, Information Hiding.

[219]  Qasem Abu Al-Haija,et al.  Implementing variable length Pseudo Random Number Generator (PRNG) with fixed high frequency (1.44 GHZ) via Vertix-7 FPGA family , 2015 .

[220]  Angelos D. Keromytis,et al.  SQLrand: Preventing SQL Injection Attacks , 2004, ACNS.

[221]  Alfredo De Santis,et al.  Modeling energy-efficient secure communications in multi-mode wireless mobile devices , 2015, J. Comput. Syst. Sci..

[222]  H. Nissenbaum A Contextual Approach to Privacy Online , 2011, Daedalus.

[223]  Min Chen,et al.  Privacy Protection and Intrusion Avoidance for Cloudlet-Based Medical Data Sharing , 2020, IEEE Transactions on Cloud Computing.

[224]  Ananthram Swami,et al.  The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).

[225]  Monther Aldwairi,et al.  Automated malicious advertisement detection using VirusTotal, URLVoid, and TrendMicro , 2017, 2017 8th International Conference on Information and Communication Systems (ICICS).

[226]  Kazumasa Omote,et al.  An Approach to Predict Drive-by-Download Attacks by Vulnerability Evaluation and Opcode , 2015, 2015 10th Asia Joint Conference on Information Security.

[227]  Wen-Pinn Fang,et al.  Friendly progressive visual secret sharing , 2008, Pattern Recognit..

[228]  Aron Culotta,et al.  Tweedr: Mining twitter to inform disaster response , 2014, ISCRAM.

[229]  Angelos D. Keromytis,et al.  On the General Applicability of Instruction-Set Randomization , 2010, IEEE Transactions on Dependable and Secure Computing.

[230]  Joeri de Ruiter,et al.  Designed to Fail: A USB-Connected Reader for Online Banking , 2012, NordSec.

[231]  Poornima Mohan,et al.  Implementation and Comparison of different Data Hiding Techniques in Image Steganography , 2019, 2019 3rd International Conference on Trends in Electronics and Informatics (ICOEI).

[232]  Martín Abadi,et al.  Message-Locked Encryption for Lock-Dependent Messages , 2013, IACR Cryptol. ePrint Arch..

[233]  Simin Nadjm-Tehrani,et al.  Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.

[234]  Lin-Shan Lee,et al.  Audio Word2Vec: Unsupervised Learning of Audio Segment Representations Using Sequence-to-Sequence Autoencoder , 2016, INTERSPEECH.

[235]  Bostjan Brumen,et al.  Performance analysis of two open source intrusion detection systems , 2016, 2016 39th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[236]  Remo Burkhard,et al.  Knowledge visualization: The use of complementary visual representations for the transfer of knowledge. A model, a framework, and four new approaches , 2005 .

[237]  Gerd Leuchs,et al.  Attacks on practical quantum key distribution systems (and how to prevent them) , 2015, 1512.07990.

[238]  Heng Yin,et al.  DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.

[239]  Mahmoud A. Smadi,et al.  Efficient FPGA Implementation of RSA Coprocessor Using Scalable Modules , 2014, FNC/MobiSPC.

[240]  Zhaohui Liang,et al.  A System Call Randomization Based Method for Countering Code-Injection Attacks , 2009 .

[241]  Irfan-Ullah Awan,et al.  Performance Evaluation Study of Intrusion Detection Systems , 2011, ANT/MobiWIS.

[242]  Alfredo De Santis,et al.  Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.

[243]  Benjamin Livshits,et al.  Verified Security for Browser Extensions , 2011, 2011 IEEE Symposium on Security and Privacy.

[244]  Bruno Robisson,et al.  Contactless Electromagnetic Active Attack on Ring Oscillator Based True Random Number Generator , 2012, COSADE.

[245]  Pan Jianwei Quantum Science Satellite , 2014 .

[246]  Muttukrishnan Rajarajan,et al.  Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.

[247]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[248]  Martín Abadi,et al.  On Protection by Layout Randomization , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.

[249]  Laurent Fesquet,et al.  A Self-Timed Ring Based True Random Number Generator , 2013, 2013 IEEE 19th International Symposium on Asynchronous Circuits and Systems.

[250]  Christopher Krügel,et al.  Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks , 2009, DIMVA.

[251]  Antonio Ruiz-Martínez,et al.  Privacy enhancement in anonymous network channels using multimodality injection , 2015, Secur. Commun. Networks.

[252]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[253]  Subhash Chand Bunker,et al.  Linear equation based visual secret sharing scheme , 2014, 2014 IEEE International Advance Computing Conference (IACC).

[254]  Cengiz Acartürk,et al.  The analysis of feature selection methods and classification algorithms in permission based Android malware detection , 2014, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).

[255]  Feng Hao,et al.  DOMtegrity: ensuring web page integrity against malicious browser extensions , 2019, International Journal of Information Security.

[256]  Honorio Martín,et al.  A New TRNG Based on Coherent Sampling With Self-Timed Rings , 2016, IEEE Transactions on Industrial Informatics.

[257]  Raffael Marty,et al.  Applied Security Visualization , 2008 .

[258]  Michele Nappi,et al.  Gait Analysis for Gender Classification in Forensics , 2019, DependSys.

[259]  Ranjit Kumar,et al.  Gender Recognition Through Face Using Deep Learning , 2018 .

[260]  Subramanian Ramanathan,et al.  SALSA: A Novel Dataset for Multimodal Group Behavior Analysis , 2015, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[261]  Jenq-Neng Hwang,et al.  An Ensemble of Invariant Features for Person Reidentification , 2017, IEEE Transactions on Circuits and Systems for Video Technology.

[262]  Xiangyu Ju Android malware detection through permission and package , 2014, 2014 International Conference on Wavelet Analysis and Pattern Recognition.

[263]  Xinghuo Yu,et al.  A multi-module anomaly detection scheme based on system call prediction , 2013, 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA).

[264]  Milos D. Ercegovac,et al.  Digital Arithmetic , 2003, Wiley Encyclopedia of Computer Science and Engineering.

[265]  Xiongfeng Ma,et al.  ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .

[266]  Stefan Savage,et al.  Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser , 2017, CSET @ USENIX Security Symposium.

[267]  Jari-Matti Mäkelä,et al.  Diversification of System Calls in Linux Binaries , 2014, INTRUST.

[268]  Wolfgang Hommel,et al.  A Process Framework for Stakeholder-specific Visualization of Security Metrics , 2018, ARES.

[269]  Michael E. Lesk,et al.  The New Front Line: Estonia under Cyberassault , 2007, IEEE Security & Privacy.

[270]  Hazem M. Hajj,et al.  ArSentD-LEV: A Multi-Topic Corpus for Target-based Sentiment Analysis in Arabic Levantine Tweets , 2019, ArXiv.

[271]  Yoshua Bengio,et al.  The problem of learning long-term dependencies in recurrent networks , 1993, IEEE International Conference on Neural Networks.

[272]  Mahdi Aiash,et al.  Machine Learning Based Botnet Identification Traffic , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.

[273]  Kailash Chandra Ray,et al.  Dynamic Hash key-based stream cipher for secure transmission of real time ECG signal , 2016, Secur. Commun. Networks.

[274]  Mohey M. Hadhoud,et al.  Studying the Effects of Most Common Encryption Algorithms , 2011, Int. Arab. J. e Technol..

[275]  Aaron Brantly The Violence of Hacking: State Violence and Cyberspace , 2017 .

[276]  Elena Dubrova,et al.  On Constructing Secure and Hardware-Efficient Invertible Mappings , 2015, 2016 IEEE 46th International Symposium on Multiple-Valued Logic (ISMVL).

[277]  Jiannong Cao,et al.  Checkpointing in hybrid distributed systems , 2004, 7th International Symposium on Parallel Architectures, Algorithms and Networks, 2004. Proceedings..

[278]  Li-Jia Wei,et al.  Sec-Buzzer: cyber security emerging topic mining with open threat intelligence retrieval and timeline event annotation , 2016, Soft Computing.

[279]  Moni Naor,et al.  Visual Cryptography , 1994, Encyclopedia of Multimedia.

[280]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[281]  Henry Rõigas Cyber War in Perspective: Lessons from the Conflict in Ukraine , 2018 .

[282]  Kevin Curran,et al.  Man in the Browser Attacks , 2012, Int. J. Ambient Comput. Intell..

[283]  Qasem Abu Al-Haija,et al.  A comparative study up to 1024 bit Euclid's GCD algorithm FPGA implementation and synthesizing , 2016, 2016 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA).

[284]  Gary Warner,et al.  A flow-based approach for Trickbot banking trojan detection , 2019, Comput. Secur..

[285]  Ayumu Kubota,et al.  An Approach to Detect Drive-By Download by Observing the Web Page Transition Behaviors , 2014, 2014 Ninth Asia Joint Conference on Information Security.

[286]  Herbert Bos,et al.  How Anywhere Computing Just Killed Your Phone-Based Two-Factor Authentication , 2016, Financial Cryptography.

[287]  Yu Yen,et al.  Human Tracking for Facility Surveillance , 2019 .

[288]  Syam Kumar Pasupuleti,et al.  Efficient revocable CP-ABE for big data access control in cloud computing , 2019, Int. J. Secur. Networks.

[289]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[290]  Mario Stipcevic,et al.  True Random Number Generators , 2014, Open Problems in Mathematics and Computational Science.

[291]  Xiangliang Zhang,et al.  Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection , 2014, IEEE Transactions on Information Forensics and Security.

[292]  Kuan-Ta Chen,et al.  DroneFace: An Open Dataset for Drone Research , 2017, MMSys.

[293]  Aqsa Rashid,et al.  Scrutiny of Steganalysis for Flipping Steganography Method , 2019 .

[294]  Mohit Sewak,et al.  An investigation of a deep learning based malware detection system , 2018, ARES.

[295]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[296]  Makhlouf Aliouat,et al.  Checkpointing distributed application running on mobile ad hoc networks , 2018, Int. J. High Perform. Comput. Netw..

[297]  Ping Zhang,et al.  Fraud Track on Secure Electronic Check System , 2018, Int. J. Digit. Crime Forensics.

[298]  K. K. Soundra Pandian,et al.  Hybrid image sharing scheme using non-recursive hash key based stream cipher , 2018, Multimedia Tools and Applications.

[299]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[300]  K. P. Soman,et al.  Deep Learning Approach for Intelligent Intrusion Detection System , 2019, IEEE Access.

[301]  Zhou Zhiping,et al.  The Study of Intrusion Prediction Based on HsMM , 2008, 2008 IEEE Asia-Pacific Services Computing Conference.

[302]  M. O. Adigun,et al.  Towards privacy with tokenization as a service , 2014, 2014 IEEE 6th International Conference on Adaptive Science & Technology (ICAST).

[303]  Riccardo Distasi,et al.  Optimization of Score-Level Biometric Data Fusion by Constraint Construction Training , 2019, iSCI.

[304]  Cihan Topal,et al.  Gender recognition with uniform local binary patterns , 2018, 2018 26th Signal Processing and Communications Applications Conference (SIU).

[305]  Mohamed Shehab,et al.  Towards improving browser extension permission management and user awareness , 2012, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[306]  Abdelmgeid A. Ali,et al.  Enhancing SMM Image Steganography Method by using LSBraille Image Steganography Method (SMMWB; Secret Message Matching With Braille) , 2013 .

[307]  Shahram Rahimi,et al.  A New Roll-Forward Checkpointing / Recovery Mechanism for Cluster Federation , 2006 .

[308]  Marc Cheong,et al.  A microblogging-based approach to terrorism informatics: Exploration and chronicling civilian sentiment and response to terrorism events via Twitter , 2011, Inf. Syst. Frontiers.

[309]  Dhanashri Ashok Bhosale,et al.  Comparative study and analysis of network intrusion detection tools , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[310]  Monther Aldwairi,et al.  Detection of Drive-by Download Attacks Using Machine Learning Approach , 2017, Int. J. Inf. Secur. Priv..

[311]  J. Yuill,et al.  Honeyfiles: deceptive files for intrusion detection , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[312]  Jean-Luc Gaudiot,et al.  Hardware Acceleration for Cryptography Algorithms by Hotspot Detection , 2013, GPC.

[313]  Anastasios Tefas,et al.  Face Verification and Recognition for Digital Forensics and Information Security , 2019, 2019 7th International Symposium on Digital Forensics and Security (ISDFS).

[314]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[315]  Kim-Kwang Raymond Choo,et al.  Shellshock Vulnerability Exploitation and Mitigation: A Demonstration , 2017 .

[316]  Song Guo,et al.  A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context , 2017, IEEE Transactions on Big Data.

[317]  Lior Rokach,et al.  Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers , 2017, RAID.

[318]  Erik Gartzke,et al.  The Myth of Cyberwar: Bringing War in Cyberspace Back Down to Earth , 2013, International Security.

[319]  Nathaniel Evans,et al.  Active Defense Techniques , 2018, Cyber Resilience of Systems and Networks.

[320]  Stefan Metzger,et al.  Stakeholder Specific Visualization and Automated Reporting of Network Scanning Results applying Vis4Sec , 2018, DFN-Forum Kommunikationstechnologien.

[321]  Ja-Chen Lin,et al.  Secret image sharing , 2002, Comput. Graph..

[322]  Ramesh Karri,et al.  Minimizing energy consumption of secure wireless session with QoS constraints , 2002, 2002 IEEE International Conference on Communications. Conference Proceedings. ICC 2002 (Cat. No.02CH37333).

[323]  Marimuthu Palaniswami,et al.  Internet of Things (IoT): A vision, architectural elements, and future directions , 2012, Future Gener. Comput. Syst..

[324]  Md Sazzad Hossain Social Media and Terrorism , 2015 .

[325]  Andrea F. Abate,et al.  Near Real-Time Three Axis Head Pose Estimation Without Training , 2019, IEEE Access.

[326]  Jiguo Li,et al.  Flexible and Fine-Grained Attribute-Based Data Storage in Cloud Computing , 2017, IEEE Transactions on Services Computing.

[327]  Yuan Ma,et al.  Entropy Evaluation for Oscillator-Based True Random Number Generators , 2014, CHES.

[328]  Rajkumar Buyya,et al.  iFogSim: A toolkit for modeling and simulation of resource management techniques in the Internet of Things, Edge and Fog computing environments , 2016, Softw. Pract. Exp..

[329]  Shyong Jian Shyu,et al.  Image encryption by random grids , 2007, Pattern Recognit..

[330]  Jin Li,et al.  Secure Deduplication with Efficient and Reliable Convergent Key Management , 2014, IEEE Transactions on Parallel and Distributed Systems.

[331]  Rafal Rohozinski,et al.  Stuxnet and the Future of Cyber War , 2011 .

[332]  Eoghan Casey,et al.  Digital Evidence and Computer Crime , 2000 .

[333]  Hend S. Al-Khalifa,et al.  A System for Sentiment Analysis of Colloquial Arabic Using Human Computation , 2014, TheScientificWorldJournal.

[334]  K. P. Soman,et al.  Applying convolutional neural network for network intrusion detection , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[335]  Michele Nappi,et al.  Transfer Learning for Facial Attributes Prediction and Clustering , 2019, iSCI.

[336]  M. Drutarovsky,et al.  A Robust Chaos-Based True Random Number Generator Embedded in Reconfigurable Switched-Capacitor Hardware , 2007, 2007 17th International Conference Radioelektronika.

[337]  Martin Thomson,et al.  Hypertext Transfer Protocol Version 2 (HTTP/2) , 2015, RFC.

[338]  Benny Pinkas,et al.  Secure Deduplication of Encrypted Data without Additional Independent Servers , 2015, CCS.

[339]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[340]  Vivek Kanhangad,et al.  Gender classification in smartphones using gait information , 2018, Expert Syst. Appl..

[341]  Mutaz Mohammad,et al.  A Numerical Solution of Fredholm Integral Equations of the Second Kind Based on Tight Framelets Generated by the Oblique Extension Principle , 2019, Symmetry.

[342]  Peng Ning,et al.  Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).

[343]  M. Nirmala Devi,et al.  Golden-chip free power metric based hardware trojan detection and diagnosis , 2017 .

[344]  Ajit Singh,et al.  Review on Multibiometrics: Classifications, Normalization and Fusion Levels , 2018, 2018 International Conference on Advances in Computing and Communication Engineering (ICACCE).

[345]  Karen Scarfone,et al.  Common Vulnerability Scoring System , 2006, IEEE Security & Privacy.

[346]  Ville Leppänen,et al.  Chapter 28 – Man-in-the-Browser Attacks in Modern Web Browsers , 2014 .

[347]  Makhlouf Aliouat,et al.  A New Efficient Checkpointing Algorithm for Distributed Mobile Computing , 2015 .

[348]  Hugo Proença,et al.  QUIS-CAMPI: an annotated multi-biometrics data feed from surveillance scenarios , 2017, IET Biom..

[349]  Aziz Mohaisen,et al.  Detecting and Classifying Android Malware Using Static Analysis along with Creator Information , 2015, Int. J. Distributed Sens. Networks.

[350]  N. Mohankumar,et al.  Malicious combinational Hardware Trojan detection by Gate Level Characterization in 90nm technology , 2014, Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT).

[351]  S. R. El-Beltagy,et al.  Open issues in the sentiment analysis of Arabic social media: A case study , 2013, 2013 9th International Conference on Innovations in Information Technology (IIT).

[352]  Roberto Di Pietro,et al.  Titans' revenge: Detecting Zeus via its own flaws , 2013, Comput. Networks.

[353]  Simha Sethumadhavan,et al.  Reviving instruction set randomization , 2017, 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[354]  Tadashi Dohi,et al.  Comparing Checkpoint and Rollback Recovery Schemes in a Cluster System , 2012, ICA3PP.

[355]  Eko Hari Rachmawanto,et al.  Simple and secure image steganography using LSB and triple XOR operation on MSB , 2018, 2018 International Conference on Information and Communications Technology (ICOIACT).

[356]  Robert H. Deng,et al.  Deduplication on Encrypted Big Data in Cloud , 2016, IEEE Transactions on Big Data.

[357]  Wai Sze Leung,et al.  Improving Hidden Message Extraction Using LSB Steganalysis Techniques , 2018, ICISA.

[358]  Gandharba Swain,et al.  Performance evaluation parameters of image steganography techniques , 2016, 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS).

[359]  K. P. Soman,et al.  Evaluating effectiveness of shallow and deep networks to intrusion detection system , 2017, 2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI).

[360]  Sambit Bakshi,et al.  Wavelet energy feature based source camera identification for ear biometric images , 2020, Pattern Recognit. Lett..

[361]  Jian-Wei Pan,et al.  Source attack of decoy-state quantum key distribution using phase information , 2013, 1304.2541.

[362]  Mourad Debbabi,et al.  SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream , 2017, ARES.

[363]  Chao Yang,et al.  Provable ownership of files in deduplication cloud storage , 2015, Secur. Commun. Networks.

[364]  Chip Elliott,et al.  Current status of the DARPA quantum network (Invited Paper) , 2005, SPIE Defense + Commercial Sensing.

[365]  Amosse Edouard,et al.  Event detection and analysis on short text messages. (Détection d'événement et analyse des messages courts) , 2017 .

[366]  Abed Allah Khamaiseh,et al.  A comprehensive survey of arabic sentiment analysis , 2019, Inf. Process. Manag..

[367]  Qasem Abu Al-Haija,et al.  Cost analysis study of variable parallel prefix adders using altera cyclone IV FPGA kit , 2017, 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA).

[368]  Rastislav Lukac,et al.  Bit-level based secret sharing for image encryption , 2005, Pattern Recognition.

[369]  Angelos D. Keromytis,et al.  Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution , 2011, Moving Target Defense.

[370]  Lalu Banoth,et al.  A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .

[371]  Ville Leppänen,et al.  A Survey on Internal Interfaces Used by Exploits and Implications on Interface Diversification , 2016, NordSec.

[372]  Sean Lawson,et al.  Putting the "war" in cyberwar: Metaphor, analogy, and cybersecurity discourse in the United States , 2012, First Monday.

[373]  Ali Kanso,et al.  A novel secret image sharing scheme using large primes , 2017, Multimedia Tools and Applications.

[374]  Jong Min Kim,et al.  Power Adaptive Data Encryption for Energy-Efficient and Secure Communication in Solar-Powered Wireless Sensor Networks , 2016, J. Sensors.

[375]  Christopher Krügel,et al.  Detection and analysis of drive-by-download attacks and malicious JavaScript code , 2010, WWW '10.

[376]  Simon Parkinson,et al.  Fog computing security: a review of current applications and security solutions , 2017, Journal of Cloud Computing.

[377]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[378]  Jing He,et al.  Security in Fog Computing through Encryption , 2016 .

[379]  Divya Bhatnagar,et al.  A Comparative Study of Symmetric Key Encryption Algorithms , 2014 .

[380]  Arwa Alrawais,et al.  Fog Computing for the Internet of Things: Security and Privacy Issues , 2017, IEEE Internet Computing.

[381]  Ja-Chen Lin,et al.  An image-sharing method with user-friendly shadow images , 2003, IEEE Trans. Circuits Syst. Video Technol..

[382]  Mansoor Alam,et al.  A Deep Learning Approach for Network Intrusion Detection System , 2016, EAI Endorsed Trans. Security Safety.

[383]  Wei Cao,et al.  Implementation of high performance hardware architecture of face recognition algorithm based on local binary pattern on FPGA , 2015, 2015 IEEE 11th International Conference on ASIC (ASICON).

[384]  Indrajit Ray,et al.  Dynamic Security Risk Management Using Bayesian Attack Graphs , 2012, IEEE Transactions on Dependable and Secure Computing.

[385]  M. Wilscy,et al.  Detection of randomized bot command and control traffic on an end-point host , 2016 .

[386]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[387]  Orachat Chitsobhuk,et al.  Multi-pipeline Architecture for Face Recognition on FPGA , 2009, 2009 International Conference on Digital Image Processing.

[388]  Helen J. Wang,et al.  RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).

[389]  Bidyut Gupta,et al.  A Recovery Scheme for Cluster Federations Using Sender-based Message Logging , 2011, J. Comput. Inf. Technol..

[390]  Odysseas G. Koufopavlou,et al.  Random number generator architecture and VLSI implementation , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[391]  Aleix M. Martinez,et al.  The AR face database , 1998 .

[392]  Zachary Chase Lipton A Critical Review of Recurrent Neural Networks for Sequence Learning , 2015, ArXiv.