
Volume 23, Issue 5 (2018)
Research Articles
Performance Evaluation of an Anomaly-Detection Algorithm for Keystroke-Typing Based Insider Detection
Liang He, Zhixiang Li, and Chao Shen
SecureWeb: Protecting Sensitive Information Through the Web Browser Extension with a Security Token
Shuang Liang, Yue Zhang, Bo Li, Xiaojie Guo, Chunfu Jia, and Zheli Liu
Efficient Feature Extraction Using Apache Spark for Network Behavior Anomaly Detection
Xiaoming Ye, Xingshu Chen, Dunhu Liu, Wenxian Wang, Li Yang, Gang Liang, and Guolin Shao
A Scheduling Optimization Technique Based on Reuse in Spark to Defend Against APT Attack
Jianchao Tang, Ming Xu, Shaojing Fu, and Kai Huang
Revocable Hierarchical Identity-Based Broadcast Encryption
Dawei Li, Jianwei Liu, Zongyang Zhang, Qianhong Wu, and Weiran Liu
A Generic TC-Based Method to Find the Weakness in Different Phases of Masking Schemes
Ming Tang, Yuguang Li, Yanbin Li, Pengbo Wang, Dongyan Zhao, Weigao Chen, and Huanguo Zhang
Software System Evolution Analysis Method Based on Algebraic Topology
Chun Shan, Liyuan Liu, Jingfeng Xue, Changzhen Hu, and Hongjin Zhu
Secure Authentication Protocol for Mobile Payment
Kai Fan, Hui Li, Wei Jiang, Chengsheng Xiao, and Yintang Yang
Side-Channel Attacks in a Real Scenario
Ming Tang, Maixing Luo, Junfeng Zhou, Zhen Yang, Zhipeng Guo, Fei Yan, and Liang Liu
Secure Device Pairing via Handshake Detection
Zhenge Guo, Xueguang Gao, Qiang Ma, and Jizhong Zhao