{"title":"Enforcing Security in Artificially Intelligent Robots Using Monitors (Short Paper)","authors":"Orhio Mark Creado, P. D. Le","doi":"10.1007/978-3-319-72359-4_40","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_40","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121277187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using the B Method to Formalize Access Control Mechanism with TrustZone Hardware Isolation (Short Paper)","authors":"Lu Ren, Rui Chang, Qing Yin, Wei Wang","doi":"10.1007/978-3-319-72359-4_47","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_47","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117215911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection","authors":"Tingmin Wu, Derek Wang, S. Wen, Yang Xiang","doi":"10.1007/978-3-319-72359-4_57","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_57","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130193226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption","authors":"Toshiya Shimizu, Takeshi Shimoyama","doi":"10.1007/978-3-319-72359-4_15","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_15","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125969900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Masaya Yasuda, Takeshi Shimoyama, M. Takenaka, N. Abe, Shigefumi Yamada, Junpei Yamaguchi
{"title":"Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016","authors":"Masaya Yasuda, Takeshi Shimoyama, M. Takenaka, N. Abe, Shigefumi Yamada, Junpei Yamaguchi","doi":"10.1007/978-3-319-72359-4_24","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_24","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122881986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jia Wan, Mohammad Zulkernine, Philip A. Eisen, C. Liem
{"title":"Defending Application Cache Integrity of Android Runtime","authors":"Jia Wan, Mohammad Zulkernine, Philip A. Eisen, C. Liem","doi":"10.1007/978-3-319-72359-4_45","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_45","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124026051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang Chen, You-Chi Wang, Wen-Yu Kao
{"title":"Design and Implementation of a Lightweight Kernel-Level Network Intrusion Prevention System for Virtualized Environment (Short Paper)","authors":"Mei-Ling Chiang, Jian-Kai Wang, Li-Chi Feng, Yang Chen, You-Chi Wang, Wen-Yu Kao","doi":"10.1007/978-3-319-72359-4_36","DOIUrl":"https://doi.org/10.1007/978-3-319-72359-4_36","url":null,"abstract":"","PeriodicalId":106775,"journal":{"name":"Information Security Practice and Experience","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116546215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}