Abstract is missing.
- Structural Weaknesses in the Open Smart Grid ProtocolKlaus Kursawe, Christiane Peters. 1-10 [doi]
- A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial SettingDejan Baca, Martin Boldt, Bengt Carlsson, Andreas Jacobsson. 11-19 [doi]
- Optimizing IT Service Costs with Respect to the Availability Service Level ObjectiveSascha Bosse, Matthias Splieth, Klaus Turowski. 20-29 [doi]
- PALPAS - PAssword Less PAssword SynchronizationMoritz Horsch, Andreas Hülsing, Johannes A. Buchmann. 30-39 [doi]
- Advanced Identity and Access Policy Management Using Contextual DataMatthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs, Günther Pernul. 40-49 [doi]
- Publicly Verifiable Private Aggregation of Time-Series DataBence Gabor Bakondi, Andreas Peter, Maarten H. Everts, Pieter H. Hartel, Willem Jonker. 50-59 [doi]
- Accountable Redactable SignaturesHenrich Christopher Pöhls, Kai Samelin. 60-69 [doi]
- The Role and Security of Firewalls in IaaS Cloud ComputingJordan Cropper, Johanna Ullrich, Peter Frühwirt, Edgar R. Weippl. 70-79 [doi]
- Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day AttacksShane S. Clark, Aaron Paulos, Brett Benyo, Partha Pratim Pal, Richard E. Schantz. 80-89 [doi]
- Uncovering Use-After-Free Conditions in Compiled CodeDavid Dewey, Bradley Reaves, Patrick Traynor. 90-99 [doi]
- All-Solution Satisfiability Modulo Theories: Applications, Algorithms and BenchmarksQuoc-Sang Phan, Pasquale Malacaria. 100-109 [doi]
- Fair Fingerprinting Protocol for Attesting Software MisusesRaphael C. S. Machado, Davidson R. Boccardo, Vinícius Gusmão Pereira de Sá, Jayme Luiz Szwarcfiter. 110-119 [doi]
- A Lightweight Framework for Cold Boot Based Forensics on Mobile DevicesBenjamin Taubmann, Manuel Huber, Sascha Wessel, Lukas Heim, Hans Peter Reiser, Georg Sigl. 120-128 [doi]
- Dynamic Self-Protection and Tamperproofing for Android Apps Using Native CodeMykola Protsenko, Sebastien Kreuter, Tilo Müller. 129-138 [doi]
- Don't Brick Your Car: Firmware Confidentiality and Rollback for VehiclesHafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes. 139-148 [doi]
- Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at RiskDan Gorton. 149-158 [doi]
- The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001Bahareh Shojaie, Hannes Federrath, Iman Saberi. 159-167 [doi]
- On the Isofunctionality of Network Access Control ListsMalek Belhaouane, Joaquín García-Alfaro, Hervé Debar. 168-173 [doi]
- Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating SystemsTariq Fadai, Sebastian Schrittwieser, Peter Kieseberg, Martin Mulazzani. 174-179 [doi]
- A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet TrafficElias Bou-Harb, Mourad Debbabi, Chadi Assi. 180-185 [doi]
- On Reconnaissance with IPv6: A Pattern-Based Scanning ApproachJohanna Ullrich, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl. 186-192 [doi]
- Hardware Security Evaluation Using Assurance Case ModelsHenrique Kawakami, Roberto Gallo, Ricardo Dahab, Erick Nascimento. 193-198 [doi]
- Physically Secure Code and Data Storage in Autonomously Booting SystemsJohannes Götzfried, Johannes Hampel, Tilo Müller. 199-204 [doi]
- Error/Intrusion Target Identification on the Physical Layer over a BICM SchemeSihem Châabouni, Amel Meddeb-Makhlouf. 205-210 [doi]
- Towards Abuse Detection and Prevention in IaaS Cloud ComputingJens Lindemann. 211-217 [doi]
- A Model Implementing Certified Reputation and Its Application to TripAdvisorFrancesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera. 218-223 [doi]
- Efficiency Evaluation of Cryptographic Protocols for Boardroom VotingOksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen. 224-229 [doi]
- QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR CodesKatharina Krombholz, Peter Frühwirt, Thomas Rieder, Ioannis Kapsalis, Johanna Ullrich, Edgar R. Weippl. 230-237 [doi]
- Event Prediction with Community LeadersJun Pang, Yang Zhang. 238-243 [doi]
- Privacy and Trust in Smart Camera Sensor NetworksMichael Loughlin, Asma Adnane. 244-248 [doi]
- Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive WiretapsHessel Schut, Mark Scanlon, Jason Farina, Nhien-An Le-Khac. 249-257 [doi]
- Security Monitoring of HTTP Traffic Using Extended FlowsMartin Husák, Petr Velan, Jan Vykopal. 258-265 [doi]
- Towards a Process-Centered Resilience FrameworkRichard M. Zahoransky, Christian Brenig, Thomas G. Koslowski. 266-273 [doi]
- Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGAJürgen Fuß, Stefan Gradinger, Bernhard Greslehner-Nimmervoll, Robert Kolmhofer. 274-280 [doi]
- Impacts of Tourist Accommodations as Temporal Shelter on Evacuee Overflow for the Reassignment of Shelters JurisdictionYu Ichifuji, Noriaki Koide, Noboru Sonehara. 281-286 [doi]
- Cold Boot Attacks on DDR2 and DDR3 SDRAMSimon Lindenlauf, Hans Höfken, Marko Schuba. 287-292 [doi]
- Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P NetworksNoora Al Mutawa, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington. 293-302 [doi]
- Watch What You Wear: Preliminary Forensic Analysis of Smart WatchesIbrahim M. Baggili, Jeff Oduro, Kyle Anthony, Frank Breitinger, Glenn McGee. 303-311 [doi]
- Challenges of Data Provenance for Cloud Forensic InvestigationsVictoria M. Katilu, Virginia N. L. Franqueira, Olga Angelopoulou. 312-317 [doi]
- Composition-Malware: Building Android Malware at Run TimeGerardo Canfora, Francesco Mercaldo, Giovanni Moriano, Corrado Aaron Visaggio. 318-326 [doi]
- Network Security Challenges in Android ApplicationsDamjan Buhov, Markus Huber, Georg Merzdovnik, Edgar R. Weippl, Vesna Dimitrova. 327-332 [doi]
- Effectiveness of Opcode ngrams for Detection of Multi Family Android MalwareGerardo Canfora, Andrea De Lorenzo, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio. 333-340 [doi]
- A Model for Specification and Validation of a Trust Management Based Security Scheme in a MANET EnvironmentAida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi. 341-350 [doi]
- Risk Assessment of Public Safety and Security Mobile ServiceMatti J. Peltola, Pekka Kekolahti. 351-359 [doi]
- Trust Negotiation Based Approach to Enforce MANET Routing SecurityAida Ben Chehida Douss, Samiha Ayed, Ryma Abassi, Nora Cuppens, Sihem Guemara El Fatmi. 360-366 [doi]
- Intensifying State Surveillance of Electronic Communications: A Legal Solution in Addressing Extremism or Not?Murdoch Watney. 367-373 [doi]
- Malicious Insiders with Ties to the Internet Underground CommunityJason W. Clark, Matt Collins, Jeremy R. Strozer. 374-381 [doi]
- An Empirical Study of Click Fraud in Mobile Advertising NetworksGeumhwan Cho, Junsung Cho, Youngbae Song, Hyoungshick Kim. 382-388 [doi]
- Network-Based HTTPS Client Identification Using SSL/TLS FingerprintingMartin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda. 389-396 [doi]
- Deploying Honeypots and Honeynets: Issue of PrivacyPavol Sokol, Martin Husák, Frantiek Liptak. 397-403 [doi]
- Gradually Improving the Forensic ProcessSebastian Neuner, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl. 404-410 [doi]
- A Landmark Calibration Based IP Geolocation ApproachJingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao, Guang Zhu. 411-416 [doi]
- Markov Process Based Retrieval for Encrypted JPEG ImagesHang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li. 417-421 [doi]
- Countermeasures for Covert Channel-Internal Control ProtocolsJaspreet Kaur, Steffen Wendzel, Michael Meier 0001. 422-428 [doi]
- Novel Method of Hiding Information in IP Telephony Using Pitch ApproximationArtur Janicki. 429-435 [doi]
- Steg Blocks: Ensuring Perfect Undetectability of Network SteganographyWojciech Fraczek, Krzysztof Szczypiorski. 436-441 [doi]
- Using Facebook for Image SteganographyJason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj. 442-447 [doi]
- Color Image Stegananalysis Using Correlations between RGB ChannelsHasan Abdulrahman, Marc Chaumont, Philippe Montesinos, Baptiste Magnier. 448-454 [doi]
- Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse PositionsHui Tian, Yanpeng Wu, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai. 455-460 [doi]
- A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT CoefficientsYi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu. 461-466 [doi]
- How Much Cloud Can You Handle?Martin Gilje Jaatun, Inger Anne Tøndel. 467-473 [doi]
- Generation of Local and Expected Behaviors of a Smart Card Application to Detect Software AnomalyGermain Jolly, Baptiste Hemery, Christophe Rosenberger. 474-480 [doi]
- Towards a CERT-Communication Model as Basis to Software AssuranceOtto Hellwig, Gerald Quirchmayr, Edith Huber, Timo Mischitz, Markus Huber. 481-485 [doi]
- Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security PatternsJung-woo Sohn, Jungwoo Ryoo. 486-492 [doi]
- Personal Agent for Services in ITSShinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Tatsuhiko Hirabayashi. 493-500 [doi]
- Towards Black Box Testing of Android AppsYury Zhauniarovich, Anton Philippov, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci. 501-510 [doi]
- An Open Source Code Analyzer and Reviewer (OSCAR) FrameworkSimon Tjoa, Patrick Kochberger, Christoph Malin, Andreas Schmoll. 511-515 [doi]
- A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom FiltersMarc Antoine Gosselin-Lavigne, Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani. 516-521 [doi]
- Independent Security Testing on Agile Software Development: A Case Study in a Software CompanyJesus Choliz, Julian Vilas, Jose Moreira. 522-531 [doi]
- Incremental Development of RBAC-Controlled E-Marking System Using the B MethodNasser Al-Hadhrami, Benjamin Aziz, Shantanu Sardesai, Lotfi Ben Othmane. 532-539 [doi]
- Literature Review of the Challenges of Developing Secure Software Using the Agile ApproachHela Oueslati, Mohammad Masudur Rahman, Lotfi Ben Othmane. 540-547 [doi]
- Method Selection and Tailoring for Agile Threat Assessment and MitigationStephan Renatus, Clemens Teichmann, Jörn Eichler. 548-555 [doi]
- Overview of the Forensic Investigation of Cloud ServicesJason Farina, Mark Scanlon, Nhien-An Le-Khac, M. Tahar Kechadi. 556-565 [doi]
- Advanced Attribute-Based Key Management for Mobile Devices in Hybrid CloudsJaemin Park, Eunchan Kim, Sungjin Park, Cheoloh Kang. 566-575 [doi]
- Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the CloudSomchart Fugkeaw, Hiroyuki Sato. 576-583 [doi]
- Evaluation of a Sector-Hash Based Rapid File Detection Method for Monitoring Infrastructure-as-a-Service Cloud PlatformsManabu Hirano, Hayate Takase, Koki Yoshida. 584-591 [doi]
- PScore: A Framework for Enhancing Privacy Awareness in Online Social NetworksGeorgios Petkos, Symeon Papadopoulos, Yiannis Kompatsiaris. 592-600 [doi]
- A Framework for the Discovery, Analysis, and Retrieval of Multimedia Homemade Explosives Information on the WebTheodora Tsikrika, George Kalpakis, Stefanos Vrochidis, Ioannis Kompatsiaris, Iraklis Paraskakis, Isaak Kavasidis, Jonathan Middleton, Una Williamson. 601-610 [doi]
- Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories - Videosurveillance Forensic FrameworkDana Codreanu, André Péninou, Florence Sèdes. 611-617 [doi]
- Image Watermarking with Biometric Data for Copyright ProtectionMorgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger. 618-625 [doi]
- AnonCall: Making Anonymous Cellular Phone CallsEric Chan-Tin. 626-631 [doi]
- Concept Detection in Multimedia Web Resources About Home Made ExplosivesGeorge Kalpakis, Theodora Tsikrika, Fotini Markatopoulou, Nikiforos Pittaras, Stefanos Vrochidis, Vasileios Mezaris, Ioannis Patras, Ioannis Kompatsiaris. 632-641 [doi]
- A Secure Integrated Platform for Rapdily Formed Multiorganisation CollaborationsJohn Zic, Nerolie Oakes, Dongxi Liu, Jane Li, Chen Wang, Shiping Chen. 642-651 [doi]
- Cross-Domain Attribute Conversion for Authentication and AuthorizationStefan Thaler, Jerry den Hartog, Dhouha Ayed, Dieter Sommer, Michael Hitchens. 652-659 [doi]
- Nomad: A Framework for Developing Mission-Critical Cloud-Based ApplicationsMamadou H. Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, Vic Beach. 660-669 [doi]
- The Measurement of Data Locations in the CloudBernd Jäger, Reiner Kraft, Sebastian Luhn, Annika Selzer, Ulrich Waldmann. 670-675 [doi]
- Virtual Machine Introspection: Techniques and ApplicationsYacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud. 676-685 [doi]
- Comprehensive Approach to Increase Cyber Security and ResilienceMichal Choras, Rafal Kozik, Maria Pilar Torres Bruna, Artsiom Yautsiukhin, Andrew Churchill, Iwona Maciejewska, Irene Eguinoa, Adel Jomni. 686-692 [doi]
- Integrating Human Behavior Into the Development of Future Cyberterrorism ScenariosMax Kilger. 693-700 [doi]
- 2020 Cybercrime Economic Costs: No Measure No SolutionJart Armin, Bryn Thompson, Davide Ariu, Giorgio Giacinto, Fabio Roli, Piotr Kijewski. 701-710 [doi]
- 0-Day Vulnerabilities and CybercrimeJart Armin, Paolo Foti, Marco Cremonini. 711-718 [doi]
- Yet Another Cybersecurity Roadmapping MethodologyDavide Ariu, Luca Didaci, Giorgio Fumera, Enrico Frumento, Federica Freschi, Giorgio Giacinto, Fabio Roli. 719-726 [doi]
- TEAR: A Multi-purpose Formal Language Specification for TEsting at RuntimeJorge López, Stéphane Maag, Gerardo Morales. 727-734 [doi]
- An Active Testing Tool for Security Testing of Distributed SystemsMohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli. 735-740 [doi]
- Monitoring and Securing New Functions Deployed in a Virtualized Networking EnvironmentBertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca. 741-748 [doi]
- Security Monitoring in the Cloud: An SLA-Based ApproachValentina Casola, Alessandra De Benedictis, Massimiliano Rak. 749-755 [doi]