Generating Test Data for Insider Threat Detectors
Analysing Android’s Full Disk Encryption Feature
Design of Virtual Local Area Network Scheme Based on Genetic Optimization and Visual Analysis
Enforcing Reputation Constraints on Business Process Workflows
Mobile App Security Analysis with the MAVeriC Static Analysis Module
Flow Mobility Management in PMIPv6-based DMM (Distributed Mobility Management) Networks
A New Certificateless Blind Signature Scheme