Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs ............................................... ............................................................................... Y. Mirsky, N. Kalbo, Y. Elovici, and A. Shabtai iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things ....... ................................................................................................. J. Pawlick, J. Chen, and Q. Zhu Two-Stage Relay Selection for Enhancing Physical Layer Security in Non-Orthogonal Multiple Access ............... ................................................................................. Y. Feng, S. Yan, C. Liu, Z. Yang, and N. Yang 1638 1654 1670 Edics ............................................................................................................................................. Information for Authors ....................................................................................................................... www.signalprocessingsociety.org [ 9] JULY 2019http://dx.doi.org/10.1109/TIFS.2018.2883177 http://dx.doi.org/10.1109/TIFS.2018.2883272 http://dx.doi.org/10.1109/TIFS.2018.2883273 https://www.signalprocessingsociety.org/publications-resources/ieee-transactions-information-forensics-and-security/edics https://www.signalprocessingsociety.org/publications-resources/information-authors http://www.signalprocessingsociety.org