Human Identification with Electroencephalogram (EEG) for the Future Network Security / / Xu Huang [and others] Building Better Unsupervised Anomaly Detector with S-Transform /Sirikarn Pukkawanna [and others] Fault-Tolerant Topology Control Based on Artificial Immune Theory in WMNs /Jing Chen [and others] Virtually Reconfigurable Secure Wireless Networks Using Broadcast Tokens /Kannan Karthik On the Use of Key Assignment Schemes in Authentication Protocols /James Alderman, Jason Crampton On the Interactions between Privacy-Preserving, Incentive, and Inference Mechanisms in Participatory Sensing Systems /Idalides J. Vergara-Laurens, Diego Mendez-Chaves, Miguel A. Labrador Security Authentication of AODV Protocols in MANETs /Ahmad Alomari --