Fast QuadTree-Based Pose Estimation for Security Applications using Face Biometrics.- ATPG Binning and SAT Based Approach to Hardware Trojan Detection for Safety Critical Systems.- Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes through WiFi.- Revisiting Website Fingerprinting Attacks in Real-World Scenarios: A Case Study of Shadowsocks.- User Relationship Classication of Facebook Messenger Mobile Data using WEKA.- Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.- Real-time IoT Device Activity Detection in Edge Networks.- Analysis on the Block Reward of Fork After Withholding.- DBAF: Dynamic Binary Analysis Framework and Its Applications.- EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control.- Preventing Buffer Overflows by Context-aware Failure-oblivious Computing.- Analyzing the Communication Security between Smartphones and IoT based on CORAS.- An efficient privacy preserving batch authentication scheme with deterable function for VANETs.- Using Software Visualization for Supporting the Teaching of Map Reduce.- Walking on the Cloud: Gait Recognition, a Wearable Solution.- Anonymous Attribute-Based Conditional Proxy Re-Encryption.- Burn After Reading: Expunging Execution Footprints of Android Apps.- Comprehensive Analysis of the Permissions used in Android.- A Provably-Secure Anonymous Two-factor Authenticated Key Exchange Protocol with Stronger Anonymity.- PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search.- An OpenvSwitch Extension for SDN Traceback.- Shoot at A Pigeon And Kill A Crow: On Strike Precision of Link Flooding Attacks.- Multi-user Forward Secure Dynamic Searchable Symmetric Encryption.- Adding Confidential Transactions to Cryptocurrency IOTA with Bulletproofs.- Creating and Managing Realism in the Next-Generation Cyber Range.- Deep Android Malware Detection with Adaptive Classifier Selection.- Towards Security Authentication for IoT Devices with Lattice-based Zero-knowledge.- Performance Analysis of Searchable Symmetric Encryption Schemes on Mobile Devices.- Understanding the Behaviors of BGP-based DDoS Protection Services.- Vulnerability Assessment for Unmanned Systems Autonomy Services Architecture.- Continuous Authentication on Smartphone by means of Periocular and Virtual Keystroke.- LA3: A Lightweight Accountable and Anonymous Authentication Scheme for Resource-constrained Devices.- Android Malware Detection Methods Based on the Combination of Clustering and Classification.- Secure Semantic Search based on Two-level Index over Encrypted Cloud.- SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.