| 2014 | 10th International Conference on Information Assurance and Security, IAS 2014, Okinawa, Japan, November 28-30, 2014 |
| 2014 | A novel psychovisual model on an independent video frame for an almost lossless compression. Nur Azman Abu, Muhammad Rezal Kamel Ariffin |
| 2014 | An experimental study on firewall performance: Dive into the bottleneck for firewall effectiveness. Cheng-Hong Wang, Donghong Zhang, Hualin Lu, Jing Zhao, Zhenyu Zhang, Zheng Zheng |
| 2014 | Automatic generation of correlation rules to detect complex attack scenarios. Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk |
| 2014 | Cluster Head election in Wireless Sensor Networks. Sara El-Refaay, Marianne A. Azer, Nashwa Abdelbaki |
| 2014 | Context-aware intrusion alerts verification approach. Sherif Saad, Issa Traoré, Marcelo Luiz Brocardo |
| 2014 | ETC: Effective trustworthy communication with two-mode authentication for disaster recovery. Tanapat Ruengsatra, Kulit Na Nakorn, Kultida Rojviboonchai, Krerk Piromsopa |
| 2014 | Extraction method of Region of Interest from hand palm: Application with contactless and touchable devices. Saliha Artabaz, Karima Benatchba, Mouloud Koudil, Dellys Hachemi Nabil, Ahmed Bouridane |
| 2014 | Improving Web Application Firewalls to detect advanced SQL injection attacks. Abdelhamid Makiou, Youcef Begriche, Ahmed Serhrouchni |
| 2014 | Optimization of excerpt query process for Packet Attribution System. Shesha Shila Bharadwaj Renukuntla, Shatrunjay Rawat |
| 2014 | Passive video forgery detection techniques: A survey. Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Mohd Yamani Idna Bin Idris, Suleman Khan, Zaidi Razak, Muhammad Rezal Kamel Ariffin |
| 2014 | Secure firmware architecture using virtual hard disks. Jaebum Sim, JungChan Na |
| 2014 | Security assurance of local data stored by HTML5 web application. Mayssa Jemel, Ahmed Serhrouchni |
| 2014 | TWalker: An efficient taint analysis tool. Jinxin Ma, Puhan Zhang, Guowei Dong, Shuai Shao, Jiangxiao Zhang |
| 2014 | Towards secure end-to-end data aggregation in AMI through delayed-integrity-verification. Sye Loong Keoh, ZhaoHui Tang |