International Journal of Security and Networks
2015 Vol.10 No.3
Pages | Title and author(s) |
137-150 | Hacking smart machines with smarter ones: How to extract meaningful data from machine learning classifiersGiuseppe Ateniese; Luigi V. Mancini; Angelo Spognardi; Antonio Villani; Domenico Vitali; Giovanni Felici DOI: 10.1504/IJSN.2015.071829 |
151-169 | Security tests and attack experimentations of ProtoGENIJingcheng Gao; Yang Xiao; Sneha Rao; Fnu Shalini DOI: 10.1504/IJSN.2015.071834 |
170-182 | Accurate geolocation using network coordinatesJiyoung Shin; Eric Chan-Tin; Praveenkumar Khethavath DOI: 10.1504/IJSN.2015.071830 |
183-190 | Secure of personal health records shared in cloud computing using cipher-text attribute based encryptionMohammed Amin Benamara; Huixian Li DOI: 10.1504/IJSN.2015.071833 |
191-206 | Bytecode instrumentation mechanism for monitoring mobile application information flowMohamed Sarrab DOI: 10.1504/IJSN.2015.071835 |