Network Security Growing Grapes in Your Computer to Defend Against Malware http://dx.doi.org/10.1109/TIFS.2013.2291066 ...... ... Z. Shan and X. Wang Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid http://dx.doi.org/10.1109/TIFS.2013.2295032 . ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... .... H. Liu, H. Ning, Y. Zhang, Q. Xiong, and L. T. Yang Firewall Policy Reconnaissance: Techniques and Analysis http://dx.doi.org/10.1109/TIFS.2013.2296874 ... ......... ........ ......... ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ... M. Q. Ali, E. Al-Shaer, and T. Samak Steganography and Covert Communications The Silence of the LANs: Efficient Leakage Resilience for IPsec VPNs http://dx.doi.org/10.1109/TIFS.2013.2289978 ..... ......... ......... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... . S. Schulz, V. Varadharajan, and A.-R. Sadeghi EDICS-Editors Information Classification Scheme http://dx.doi.org/10.1109/TIFS.2014.2300722 ... ......... ......... ..... .... ......... ......... . Information for Authors http://dx.doi.org/10.1109/TIFS.2014.2300721 ....... ......... ......... ........ ...... ... ......... ........ ......... ......... . www.signalprocessingsociety.org [16] APRIL 2014 196 208 296 221 330 331http://dx.doi.org/10.1109/TIFS.2013.2291066 http://dx.doi.org/10.1109/TIFS.2013.2295032 http://dx.doi.org/10.1109/TIFS.2013.2296874 http://dx.doi.org/10.1109/TIFS.2013.2289978 http://dx.doi.org/10.1109/TIFS.2014.2300722 http://dx.doi.org/10.1109/TIFS.2014.2300721 http://www.signalprocessingsociety.org