| 2016 | A New Authentication Scheme for Cloud-based Storage Applications. Manel Medhioub, Mohamed Hamdi, Tai-Hoon Kim |
| 2016 | A Scalable Threats Classification Model in Information Systems. Mouna Jouini, Latifa Ben Arfa Rabai |
| 2016 | A Secure Multi-Tenant Framework for SDN. Hao Jiang, Ahmed Bouabdallah, Amin Aflatoonian, Jean-Marie Bonnin, Karine Guillouard |
| 2016 | A Signature-Based Intrusion Detection System for Web Applications based on Genetic Algorithm. Robert Bronte, Hossain Shahriar, Hisham M. Haddad |
| 2016 | A Study of a Smart IT Convergence Framework in IoT. Hye-young Kim |
| 2016 | A Study on Unified Security Mechanism and Platform for Centralized Business Contents. Yong-pyo Hong, Youngjun Kim |
| 2016 | Algorithms for network server anomaly behavior detection without traffic content inspection. Vladimir Eliseev, Anastasiya Gurina |
| 2016 | An Algorithm to Facilitate Intrusion Response in Mobile Ad Hoc Networks. Jagjot Kaur, Dale Lindskog |
| 2016 | An Attributed Graph Mining Approach to Detect Transfer Pricing Fraud. Alexey A. Tselykh, Margarita Knyazeva, Elena Popkova, Antonina Durfee, Alexander N. Tselykh |
| 2016 | An Efficient Secure scheme for Wireless Sensor Networks. Manel Elleuchi, Omar Cheikhrouhou, Abdulfattah Mohammad Obeid, Mohamed Abid |
| 2016 | An Enhanced Anonymous Two-factor Mutual Authentication with Key-agreement Scheme for Session Initiation Protocol. Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo |
| 2016 | Applying Virtualization Technology for the Construction of Trusted Executable Environment. Andrey Yu. Chernov, Artem S. Konoplev, Dmitry P. Zegzhda |
| 2016 | Biometric Authentication Protocols on Smartphones: An Overview. Martin Stokkenes, Ramachandra Raghavendra, Christoph Busch |
| 2016 | Color Adaptive Quantized Patterns for Presentation Attack Detection in Ocular Biometric Systems. Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch |
| 2016 | Criteria and Indices of Computer Network Protection. Vladimir I. Vorobiev, Elena L. Evnevich, Roza R. Fatkieva, Ludmila N. Fedorchenko, Dmitriy K. Levonevskiy |
| 2016 | Development of the Hierarchal Trust management System for Mobile Cluster-based Wireless Sensor Network. Alexandr S. Basan, Elena Basan, Oleg B. Makarevich |
| 2016 | Efficient Evaluation of Authorizations for Video Data. Ussama Yakub, Vijayalakshmi Atluri, Jaideep Vaidya |
| 2016 | Evolutionary Game-Based Defense Mechanism in the MANETs. Myria Bouhaddi, Kamel Adi, Mohammed Said Radjef |
| 2016 | Experimentation of Privacy Protection for JPEG Contents on Image-Sharing Platforms. Kun He, Christophe Bidan, Gaëtan Le Guelvouit |
| 2016 | Fast Implementation and Cryptanalysis of GOST R 34.12-2015 Block Ciphers. Evgeniya Ishchukova, Ludmila K. Babenko, Maxim Anikeev |
| 2016 | Frequency Domain Analysis of Large-Scale Proxy Logs for Botnet Traffic Detection. Giovanni Bottazzi, Giuseppe F. Italiano, Giuseppe Giulio Rutigliano |
| 2016 | Fuzzy Commitment Scheme based on Reed Solomon Codes. Sonam Chauhan, Ajay Sharma |
| 2016 | Impact of Drug Abuse on Face Recognition Systems: A Preliminary Study. Ramachandra Raghavendra, Kiran B. Raja, Christoph Busch |
| 2016 | Integrating non elementary actions in access control models. Salem Benferhat, Mouslim Tolba, Karim Tabia, Abdelkader Belkhir |
| 2016 | Modeling of Algebraic Analysis of GOST+ Cipher in SageMath. Ludmila K. Babenko, Ekaterina Maro, Maxim Anikeev |
| 2016 | Participant Authenticating, Error Detecting, and 100% Multiple Errors Repairing Chang-Chen-Wang's Secret Sharing Method Enhancement. Alexander G. Chefranov, Amir Narimani |
| 2016 | Phishing Susceptibility Detection through Social Media Analytics. Safwan Alam, Khalil El-Khatib |
| 2016 | Preventive information flow control through a mechanism of split addresses. Deepak Subramanian, Guillaume Hiet, Christophe Bidan |
| 2016 | Privacy-preserving Electronic Road Pricing System for Multifare Low Emission Zones. Roger Jardí-Cedó, Macià Mut Puigserver, Jordi Castellà-Roca, Magdalena Payeras-Capellà, Alexandre Viejo |
| 2016 | Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016 |
| 2016 | Safe Integration of SIEM Systems with Internet of Things: Data Aggregation, Integrity Control, and Bioinspired Safe Routing. Peter D. Zegzhda, Dmitry P. Zegzhda, Maxim O. Kalinin, Alexander I. Pechenkin, Alexander Minin, Daria S. Lavrova |
| 2016 | Security-enabled Enactment of Decentralized Workflows. Sardar Hussain, Richard O. Sinnott, Ron Poet |
| 2016 | Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units. Xavier J. A. Bellekens, Greig Paul, Christos Tachtatzis, James Irvine, Robert C. Atkinson |
| 2016 | The Improved Protocols Based on AODV in terms of Quality and Security in MANET Network. Mohammadreza Soltan Aghaei, Elham Zamani |