Full Papers [7] System-level Permission Management Mechanism of Android Device Zhu Dali, Fan Zheming, Pang Na [13] Modeling and Analysis of Network Survivability Under Attack Propagation SU YAO, Jian-feng Guan, Hongke Zhang, HUA PAN, Fei Song [16] A New Sybil-Resist Algorithm Based on the Existing Work SybilDefender in Social Networks Wei Ma, Senzhe Hu, Qiong Dai, Tingting Wang, Yinfei Huang [17] Analysis on the Reliability of Non-repairable and Repairable Network Storage Systems Yin Mingyong, Chun Wu, Tao YiZheng [19] Popularity Prediction of Tianya BBS Posts Based on User Behavior Li Ge, Hu Yue, Yu Yanyu [21] Modeling the Effect of Infection Time on Active Worm Propagations Hui Liu, Xiaolong Ma, Bo Ding, Tianzuo Wang, Qiang Lu [22] Location Privacy Preserving for Semantic-aware Applications Lefeng Zhang, Ping Xiong, Tianqing Zhu [26] Design and Implementation of Network User Behaviors Analysis based on Hadoop for Big Data Jian-feng Guan, SU YAO, Changqiao Xu, Hongke Zhang [27] An approach to Detect The Internet Water Army via Dirichlet Process Mixture Model based GSP Algorithm Li Dan, Li Qian, Hu Yue, Wenjia Niu, Tan Jianlong, Guo Li [39] A Scalable Approach for Vulnerability Discovery based on Security Patches Hongzhe Li, Hyuckmin Kwon, Jonghoon Kwon, Heejo Lee [40] Homomorphic Cryptography-based Privacy-Preserving Network Communications Christophe Bidan, Antoine Guellier, Nicolas Prigent [43] PAITS: Detecting Masquerader via Short-lived Interventional Mouse Dynamics Xiaojun Chen, Jinqiao Shi, Rui Xu, S.M. Yiu, Bingxing Fang, Fei Xu [49] Social Engineering through Social Media: A Comprehensive Investigation on Enterprise Security Rafiqul Islam, Maumita Bhattacharya [50] The 0-1 knapsack polytope -a starting point for cryptanalysis of knapsack ciphers? Vicky Mak-Hau, Lynn Batten [53] Enhancing Security of the Android Platform via Multi-Level Security Model Ji-Soo Oh, Min-Woo Park, Tai-Myoung Chung [54] Testing Similarity Digests with Random Changes Jonathan Oliver, Scott Forman, Chun Cheng Short Papers [3] A Competitive Three-Level Pruning Technique for Information Security Morshed Chowdhury, Jemal Abawajy, Andrei Kelarev, Kouichi Sakurai [5] Forensic Identification of Students Outsourcing Assignment Projects from Freelancer.com Michael Monnik, Lei Pan [11] Research of Password Recovery Method For RAR Based on Parallel Random search Liang Ge, Lianhai Wang [15] The Research of Extraction Algorithm for Target Feature of Chest Bitmap Liu Tianshi, Liu RuiXiang, Wang Hongwei [32] A survey on encrypted traffic classification Zigang Cao, Gang Xiong, Yong Zhao, Qingyun Liu, Guo Li [45] A Novel Method for Detecting Double Compressed Facebook JPEG Images Allan NG, Lei Pan, Yang Xiang [46] A Method for Detecting Trojan Based on Hidden Network Traffic Analysis YiZheng Tao, Zhiwen Chen, Gongliang Li [51] Efficient key pre-distribution for wireless sensor networks: a case study on 6LoWPAN networks running Contiki-OS Ruben Smeets, Kris Aerts, Dave Singelee, Nele Mentens |