Abstract is missing.
- A New Access Control Scheme for Facebook-Style Social NetworksJun Pang, Yang Zhang. 1-10 [doi]
- No Smurfs: Revealing Fraud Chains in Mobile Money TransfersMaria Zhdanova, Jürgen Repp, Roland Rieke, Chrystel Gaber, Baptiste Hemery. 11-20 [doi]
- BitTorrent Sync: Network Investigation MethodologyMark Scanlon, Jason Farina, M. Tahar Kechadi. 21-29 [doi]
- Divide-and-Conquer: Why Android Malware Cannot Be StoppedDominik Maier, Tilo Müller, Mykola Protsenko. 30-39 [doi]
- DroidForce: Enforcing Complex, Data-centric, System-wide Policies in AndroidSiegfried Rasthofer, Steven Arzt, Enrico Lovat, Eric Bodden. 40-49 [doi]
- Lobotomy: An Architecture for JIT Spraying MitigationMartin Jauernig, Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti. 50-58 [doi]
- A Formal Model and Analysis of the MQ Telemetry Transport ProtocolBenjamin Aziz. 59-68 [doi]
- Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded DevicesThomas Unterluggauer, Erich Wenger. 69-77 [doi]
- A Model-Based Security Toolkit for the Internet of ThingsRicardo Neisse, Igor Nai Fovino, Gianmarco Baldini, Vera Stavroulaki, Panagiotis Vlacheas, Raffaele Giaffreda. 78-87 [doi]
- Rethread: A Low-Cost Transient Fault Recovery Scheme for Multithreaded ProcessorsJian Fu, Qiang Yang 0006, Raphael Poss, Chris R. Jesshope, Chunyuan Zhang. 88-93 [doi]
- Visualizing Transaction Context in Trust and Reputation SystemsJohannes Sänger, Günther Pernul. 94-103 [doi]
- Enhanced Configuration Generation Approach for Highly Available COTS Based SystemsParsa Pourali, Ferhat Khendek, Maria Toeroe. 104-113 [doi]
- Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing WebsiteJeffrey Choo Soon Fatt, Kang-Leng Chiew, San-Nah Sze. 114-119 [doi]
- EM Leakage of RFID Devices - Comparison of Two Measurement ApproachesThomas Korak, Thomas Plos. 120-125 [doi]
- Supporting Security Automation for Multi-chassis Link Aggregation Groups via the Interconnected-Asset OntologyHenk Birkholz, Ingo Sieverdingbeck. 126-133 [doi]
- Concurrent Queries in Location Based ServicesEmad Elabd, Mohand-Said Hacid. 134-139 [doi]
- Palpable Privacy through Declarative Information Flows Tracking for Smart BuildingsFrançois Lesueur, Sabina Surdu, Romuald Thion, Yann Gripay, Meriam Ben-Ghorbel-Talbi. 140-145 [doi]
- An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient RecordsRima Addas, Ning Zhang. 146-151 [doi]
- Privacy Dashboards: Reconciling Data-Driven Business Models and PrivacyChristian Zimmermann, Rafael Accorsi, Günter Müller. 152-157 [doi]
- Healthcare Services in the Cloud - Obstacles to Adoption, and a Way ForwardKarin Bernsmed, Daniela S. Cruzes, Martin Gilje Jaatun, Børge Haugset, Erlend Andreas Gjære. 158-165 [doi]
- Continuous and Non-intrusive Reauthentication of Web Sessions Based on Mouse DynamicsEric Medvet, Alberto Bartoli, Francesca Boem, Fabiano Tarlao. 166-171 [doi]
- What Does the Fox Say? On the Security Architecture of Firefox OSMarta Piekarska, Bhargava Shastry, Ravishankar Borgaonkar. 172-177 [doi]
- Verifying Implementation of Security Design Patterns Using a Test TemplateMasatoshi Yoshizawa, Takanori Kobashi, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka. 178-183 [doi]
- AES-SEC: Improving Software Obfuscation through Hardware-AssistanceSebastian Schrittwieser, Stefan Katzenbeisser 0001, Georg Merzdovnik, Peter Kieseberg, Edgar R. Weippl. 184-191 [doi]
- Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMsBeatriz Gallego-Nicasio Crespo, Alan Garwood. 192-198 [doi]
- Network Security Analysis Using Behavior History GraphMirko Sailio, Matti Mantere, Sami Noponen. 199-206 [doi]
- A Usable Android Application Implementing Distributed Cryptography for Election AuthoritiesStephan Neumann, Oksana Kulyk, Melanie Volkamer. 207-216 [doi]
- Complete SIP Message Obfuscation: PrivaSIP over TorGeorgios Karopoulos, Alexandros Fakis, Georgios Kambourakis. 217-226 [doi]
- Privacy Preservation in Location-Based Mobile Applications: Research DirectionsAsma Patel, Esther Palomar. 227-233 [doi]
- Challenges of Composing XACML PoliciesBernard Stepien, Amy P. Felty, Stan Matwin. 234-241 [doi]
- EmailCloak: A Practical and Flexible Approach to Improve Email PrivacyItalo Dacosta, Andreas Put, Bart De Decker. 242-250 [doi]
- Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security RequirementsChristian Sillaber, Ruth Breu. 251-258 [doi]
- Evaluating the Effectiveness of ISO 27001: 2013 Based on Annex ABahareh Shojaie, Hannes Federrath, Iman Saberi. 259-264 [doi]
- A Proposal for a Unified Identity Card for Use in an Academic Federation EnvironmentFelipe Coral Sasso, Ricardo Alexandre Reinaldo De Moraes, Jean Everson Martina. 265-272 [doi]
- Defining Malicious BehaviorHermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato. 273-278 [doi]
- The SMM Rootkit Revisited: Fun with USBJoshua Schiffman, David Kaplan. 279-286 [doi]
- Towards a Hardware Trojan Detection CycleAdrian Dabrowski, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar R. Weippl. 287-294 [doi]
- PhiGARo: Automatic Phishing Detection and Incident Response FrameworkMartin Husák, Jakub Cegan. 295-302 [doi]
- Performance Measures of Behavior-Based Signatures: An Anti-malware Solution for Platforms with Limited Computing ResourceKelly Hughes, Yanzhen Qu. 303-309 [doi]
- Network Security Monitoring in a Small-Scale Smart-Grid LaboratoryMatti Mantere, Sami Noponen, Pia Olli, Jarno Salonen. 310-316 [doi]
- Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and ServicesDiego Kreutz, Eduardo Feitosa, Hugo Cunha, Heiko Niedermayer, Holger Kinkelin. 317-324 [doi]
- A Trust Management Based Security Mechanism against Collusion Attacks in a MANET EnvironmentAida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi. 325-332 [doi]
- A Resource-Optimized Approach to Efficient Early Detection of Mobile MalwareJelena Milosevic, Andreas Dittrich, Alberto Ferrante, Miroslaw Malek. 333-340 [doi]
- An Improved Role-Based Access to Android Applications with JCHRStefano Bistarelli, Gianpiero Costantino, Fabio Martinelli, Francesco Santini. 341-348 [doi]
- Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition PlatformJakub Breier, Adam Pomothy. 349-355 [doi]
- Analysis of Algorithms for Computation of Direct Partial Logic Derivatives in Multiple-Valued Decision DiagramsJozef Kostolny, Miroslav Kvassay, Elena N. Zaitseva. 356-361 [doi]
- Stochastic Model for Medical Image SegmentationZeev Barzily, Mingyue Ding, Zeev Volkovich. 362-369 [doi]
- Fast Monte Carlo Simulation Methods Adapted to Simple Petri Net ModelsMaïder Estecahandy, Stéphane Collas, Laurent Bordes, Christian Paroissin. 370-379 [doi]
- Monte-Carlo Based Reliability Modelling of a Gas Network Using Graph Theory ApproachPavel Praks, Vytis Kopustinskas. 380-386 [doi]
- Performance Determination for MSS Manufacturing System by Lz-Transform and Stochastic Processes ApproachIlia Frenkel, Svetlana Daichman, Lev Khvatskin, Neta Avraham, Oshrit Zihry, Anatoly Lisnianski. 387-392 [doi]
- On Availability Comparison of Reservation Modes for Multi-state Air Conditioning Systems Using Markov ApproachLev Khvatskin, Ilia Frenkel. 393-396 [doi]
- Semi-Markov Modelling for Multi-state SystemsVlad Stefan Barbu, Alex Karagrigoriou, Andreas Makrides. 397-402 [doi]
- Optimizing the Availability and the Operational Cost of a Periodically Inspected Multi-state Deteriorating System with Condition Based Maintenance PoliciesSonia Malefaki, Vasilis P. Koutras, Agapios N. Platis. 403-411 [doi]
- Statistical Inference for Heavy-Tailed Distributions in Technical SystemsAlex Karagrigoriou, Ilia Vonta. 412-419 [doi]
- A Comparative Study of Control Charts for Zero-Inflated Binomial ProcessesAthanasios C. Rakitzis, Petros E. Maravelakis, Philippe Castagliola. 420-425 [doi]
- Practical Applications of Advanced Statistical Models in Reliability Data AnalysisVasiliy Krivtsov, Olexandr Yevkin. 426-429 [doi]
- On Sensitivity of Reliability Models to the Shape of Life and Repair Time DistributionsVladimir Rykov, Dmitry Efrosinin, Vladimir Vishnevsiy. 430-437 [doi]
- Organizing On-Site Volunteers: An App-Based ApproachStefan Sackmann, Marlen Hofmann, Hans Betke. 438-439 [doi]
- Visualization of Recovery Situation in Disaster Area by Using Web Reservation DataYu Ichifuji, Noboru Sonehara. 440-446 [doi]
- A k-anonymity method based on search engine query statistics for disaster impact statementsHidenobu Oguri, Noboru Sonehara. 447-454 [doi]
- A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting DisclosureHoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen. 455-460 [doi]
- Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisationHaruno Kataoka, Yohei Ogawa, Isao Echizen, Tetsuji Kuboyama, Hiroshi Yoshiura. 461-467 [doi]
- Risk-Aware Design and Management of Resilient NetworksPiotr Cholda. 468-475 [doi]
- Vulnerability-Based Security Pattern Categorization in Search of Missing PatternsPriya Anand, Jungwoo Ryoo, Rick Kazman. 476-483 [doi]
- Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped PatternsDae-Kyoo Kim, Jungwoo Ryoo, Suntae Kim. 484-489 [doi]
- Using Assurance Cases to Develop Iteratively Security Features Using ScrumLotfi Ben Othmane, Pelin Angin, Bharat K. Bhargava. 490-497 [doi]
- LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow AnalysisSanjay Rawat, Laurent Mounier, Marie-Laure Potet. 498-505 [doi]
- Visualization of Security Metrics for Cyber Situation AwarenessIgor V. Kotenko, Evgenia Novikova. 506-513 [doi]
- A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security PoliciesWoohyun Shim, Fabio Massacci, Alessandra Tedeschi, Alessandro Pollini. 514-522 [doi]
- Mathematical Modelling in Air Traffic Management SecurityDenis Kolev, Evgeniy Morozov. 523-529 [doi]
- The Social Acceptance of the Passivation of Misused AircraftAna P. G. Martins. 530-536 [doi]
- EMFASE - An Empirical Framework for Security Design and Economic Trade-offFabio Massacci, Federica Paci, Bjørnar Solhaug, Alessandra Tedeschi. 537-543 [doi]
- Security Situation Management: Towards Developing a Time-Critical Decision Making Capability for SESARRainer Koelle. 544-551 [doi]
- Design-In Security for Air Traffic ControlMartin Hawley, Karol Gotz, John Hird, Chris Machin. 552-555 [doi]
- Learn to SWIMMatias Krempel, Martin Gilje Jaatun. 556-560 [doi]
- Real-Time Screen Watermarking Using Overlaying LayerMaciej Piec, Andreas Rauber. 561-570 [doi]
- An Efficient Intrinsic Authorship Verification Scheme Based on Ensemble LearningOren Halvani, Martin Steinebach. 571-578 [doi]
- Efficient Cropping-Resistant Robust Image HashingMartin Steinebach, Huajian Liu, York Yannikos. 579-585 [doi]