Cryptovirology: Virus Approach
Cyber threats in social networking websites
Cyber-Insurance in Internet Security: A Dig into the Information Asymmetry Problem
Darknet-Based Inference of Internet Worm Temporal Characteristics
Darwin inside the machines: Malware evolution and the consequences for computer security
Data Aggregation and Privacy for Police Patrols
Data Confidentiality in Mobile Ad hoc Networks
Data Group Anonymity: General Approach
Data Hiding Techniques Using Prime and Natural Numbers
Data Reduction in Intrusion Alert Correlation
Data Security Equals Graph Connectivity
Data security in mobile devices by geo locking
Data Tastes Better Seasoned: Introducing the ASH Family of Hashing Algorithms
DDNFS: a Distributed Digital Notary File System
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
De-anonymizing Social Networks
Dealing With Curious Players in Secure Networks
Debunking some myths about biometric authentication
DECENT: A Decentralized Architecture for Enforcing Privacy in Online Social Networks
Declarative Reconfigurable Trust Management