Abstract is missing.
- Privacy, Ethics and Big DataJason Hong. 5
- Tax Fraud and Investigation Procedures - Everybody, Every Where, Every TimeHans-Joachim Lenz. 7-8
- Ethics in Security ResearchEdgar R. Weippl. 9
- Injecting CSP for Fun and SecurityChristoph Kerschbaumer, Sid Stamm, Stefan Brunthaler. 15-25 [doi]
- Anomaly-based Mobile Malware Detection: System Calls as Source for FeaturesDominik Teubert, Fred Grossmann, Ulrike Meyer. 26-36 [doi]
- Security and Privacy Practices in Healthcare Information Systems: A Cluster Analysis of European HospitalsSylvestre Uwizeyemungu, Placide Poba-Nzaou. 37-45 [doi]
- Handwritten Signature Verification for Mobile PhonesNilakantha Paudel, Marco Querini, Giuseppe F. Italiano. 46-52 [doi]
- Personalised Privacy by Default Preferences - Experiment and AnalysisToru Nakamura, Shinsaku Kiyomoto, Welderufael B. Tesfay, Jetzabel Serna. 53-62 [doi]
- Comparing and Integrating Break-the-Glass and Delegation in Role-based Access Control for HealthcareAna Ferreira, Gabriele Lenzini. 63-73 [doi]
- Differential Security Evaluation of Simeck with Dynamic Key-guessing TechniquesKexin Qiao, Lei Hu, Siwei Sun. 74-84 [doi]
- Efficient Authorization Authority Certificate Distribution in VANETsSebastian Bittl, Karsten Roscher. 85-96 [doi]
- Quantitative Evaluation of Security on Cryptographic ICs against Fault Injection AttacksC. Shao, H. Li, G. Xu. 97-104 [doi]
- A Collaborative Analysis System for Cross-organization Cyber Incident HandlingGiuseppe Settanni, Florian Skopik, Yegor Shovgenya, Roman Fiedler. 105-116 [doi]
- On TLS 1.3 - Early Performance Analysis in the IoT FieldSimone Bossi, Tea Anselmo, Guido Bertoni. 117-125 [doi]
- An Approach to Personalized Privacy Policy Recommendations on Online Social NetworksAmmar Abuelgasim, Anne Kayem. 126-137 [doi]
- Retrospective Study of Third-party Web TrackingTim Wambach, Katharina Bräunlich. 138-145 [doi]
- DDHCS: Distributed Denial-of-service Threat to YARN Clusters based on Health Check ServiceWenting Li, Qingni Shen, Chuntao Dong, Yahui Yang, Zhonghai Wu. 146-156 [doi]
- Performance Analysis of Real Time Implementations of Voice Encryption Algorithms using Blackfin ProcessorsCristina-Loredana Duta, Laura Gheorghe, Nicolae Tapus. 157-166 [doi]
- IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance EvaluationRafiullah Khan, Kieran McLaughlin, David Laverty, Sakir Sezer. 167-178 [doi]
- An Anonymous Geocast Scheme for ITS ApplicationsCarsten Büttner, Sorin A. Huss. 179-189 [doi]
- Improving Database Security in Web-based EnvironmentsFrancesco Di Tria, Ezio Lefons, Filippo Tangorra. 193-200 [doi]
- Analysis of ISO 27001: 2013 Controls Effectiveness for Cloud ComputingMuhammad Imran Tariq, Vito Santarcangelo. 201-208 [doi]
- Mitigating Local Attacks Against a City Traffic ControllerNils Ulltveit-Moe, Steffen Pfrang, László Erdödi, Héctor Nebot. 209-218 [doi]
- Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case StudyGencer Erdogan, Ketil Stølen, Jan Øyvind Aagedal. 219-226 [doi]
- Risk Management for Dynamic Metadata Exchange via a Trusted Third PartyDaniela Pöhn. 227-234 [doi]
- A Practical-time Attack on Reduced-round MISTY1Nobuyuki Sugio, Yasutaka Igarashi, Toshinobu Kaneko, Kenichi Higuchi. 235-242 [doi]
- The STRIDE Towards IPv6: A Comprehensive Threat Model for IPv6 Transition TechnologiesMarius Georgescu, Hiroaki Hazeyama, Takeshi Okuda, Youki Kadobayashi, S. Yamaguchi. 243-254 [doi]
- Streamlining Extraction and Analysis of Android RAM ImagesSimon Broenner, Hans Höfken, Marko Schuba. 255-264 [doi]
- Interaction-based Reputation Model in Online Social NetworksIzzat Alsmadi, Dianxiang Xu, Jin-Hee Cho. 265-272 [doi]
- Multi-factor Authentication Updating System Evaluation Dynamically for Service ContinuityHiroya Susuki, Rie Shigetomi Yamaguchi, Shizuo Sakamoto. 273-281 [doi]
- An Observe-and-Detect Methodology for the Security and Functional Testing of Smart Card ApplicationsGermain Jolly, Sylvain Vernois, Christophe Rosenberger. 282-289 [doi]
- Detecting Botnets using a Collaborative Situational-aware IDPSM. Lisa Mathews, Anupam Joshi, Tim Finin. 290-298 [doi]
- Experimental Evaluation of Password Recovery in Encrypted DocumentsRadek Hranicky, Petr Matousek, Ondrej Rysavy, Vladimír Veselý. 299-306 [doi]
- Tracking Explicit and Control Flows in Java and Native Android Apps CodeMariem Graa, Nora Cuppens-Boulahia, Frédéric Cuppens, Jean-Louis Lanet. 307-316 [doi]
- Trust-based Dynamic RBACTamir Lavi, Ehud Gudes. 317-324 [doi]
- Truncated, Impossible, and Improbable Differential Analysis of ASCONCihangir Tezcan. 325-332 [doi]
- Review Analysis of Properties for an Ideal Secure Biometric Template SchemePhiwa Mzila. 333-339 [doi]
- A Brief Overview of Hybrid Schemes for Biometric Fingerprint Template SecurityEdwin T. L. Rampine, Cynthia H. Ngejane. 340-346 [doi]
- An Expert System for Facilitating an Institutional Risk Profile Definition for Cyber Situational AwarenessRoman Graf, Sergiu Gordea, Heather M. Ryan, Tibaut Houzanme. 347-354 [doi]
- A Continuous LoA Compliant Trust Evaluation MethodJ. Hatin, Estelle Cherrier, Jean-Jacques Schwartzmann, V. Frey, Christophe Rosenberger. 355-363 [doi]
- Linear(hull) Cryptanalysis of Round-reduced Versions of KATANDanping Shi, Lei Hu, Siwei Sun, Ling Song. 364-371 [doi]
- A Privacy Threat for Internet Users in Internet-censoring CountriesFeno Heriniaina R.. 372-379 [doi]
- Whispers in the Cloud - A Covert Channel using the Result of Creating a Virtual MachineCong Li, Qingni Shen, Kang Chen, Yahui Yang, Zhonghai Wu. 380-387 [doi]
- A Quantitative Methodology for Security Risk Assessment of Enterprise Business ProcessesJaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar. 388-399 [doi]
- 3-Out-of-n Cheating Prevention Visual Cryptographic SchemesChing-Nung Yang, Stelvio Cimato, Jihi-Han Wu, Song-Ruei Cai. 400-406 [doi]
- Characterization of Encrypted and VPN Traffic using Time-related FeaturesGerard Draper-Gil, Arash Habibi Lashkari, Mohammad Saiful Islam Mamun, Ali A. Ghorbani. 407-414 [doi]
- High-Performance FPGA Implementation of Elliptic Curve Cryptography Processor over Binary Field GF(2^163)Md. Selim Hossain, Ehsan Saeedi, Yinan Kong. 415-422 [doi]
- Sift - An Efficient Method for Co-residency Detection on Amazon EC2Kang Chen, Qingni Shen, Cong Li, Yang Luo, Yahui Yang, Zhonghai Wu. 423-431 [doi]
- A Construction of a Twisted Ate Pairing on a Family of Kawazoe-Takahashi Curves at 192-bit Security Level and Its Cost EstimateMasahiro Ishii, Atsuo Inomata, Kazutoshi Fujikawa. 432-439 [doi]
- A New Approach for Electronic SignatureGianluca Lax, Francesco Buccafurri, Serena Nicolazzo, Antonino Nocera, Lidia Fotia. 440-447 [doi]
- Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained MicrogridsAnesu M. C. Marufu, Anne V. D. M. Kayem, Stephen D. Wolthusen. 448-456 [doi]
- Contextual Intrusion Alerts for Scada Networks - An Ontology based Approach for Intrusion Alerts Post ProcessingAbdullah Al Balushi, Kieran McLaughlin, Sakir Sezer. 457-464 [doi]
- Modelling Duqu 2.0 Malware using Attack Trees with Sequential ConjunctionPeter Maynard, Kieran McLaughlin, Sakir Sezer. 465-472 [doi]
- Collaborative Information Service - Privacy Algebra for User Defined SecurityAsim K. Pal, Subrata Bose, Arpita Maitra. 473-481 [doi]
- Characterizing SEAndroid Policies in the WildElena Reshetova, Filippo Bonazzi, Thomas Nyman, Ravishankar Borgaonkar, N. Asokan. 482-489 [doi]
- Declassification of Information with Complex Filter FunctionsKurt Stenzel, Kuzman Katkalov, Marian Borek, Wolfgang Reif. 490-497 [doi]
- A Threat Analysis Model for Identity and Access ManagementNadia Jemil Abdu, Ulrike Lechner. 498-502 [doi]
- A Pragmatic System-failure Assessment and Response ModelJassim Happa, Graham Fairclough, Jason R. C. Nurse, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese. 503-508 [doi]
- Understanding the Impact of Cyber Security Risks on SafetyChristine Izuakor. 509-513 [doi]
- Internet Streaming and Network Neutrality: Comparing the Performance of Video Hosting ServicesAlessio Botta, Aniello Avallone, Mauro Garofalo, Giorgio Ventre. 514-521 [doi]
- A Statistical Approach to the Detection of HTML Attribute Permutation SteganographyIman Sedeeq, Frans Coenen, Alexei Lisitsa. 522-527 [doi]
- A Cyberthreat Search Process and ServiceYogesh Bhanu, Sebastian Dännart, Henning von Kielpinski, Alexander Laux, Ulrike Lechner, Tobias Lehmann, Andreas Rieb, Martin Riedl, Florian Wolf. 528-535 [doi]
- Collateral Damage of Online Social Network ApplicationsIraklis Symeonidis, Pagona Tsormpatzoudi, Bart Preneel. 536-541 [doi]
- Identification of Android Malware Families with Model CheckingPasquale Battista, Francesco Mercaldo, Vittoria Nardone, Antonella Santone, Corrado Aaron Visaggio. 542-547 [doi]
- Lightweight Trust Model with High Longevity for Wireless Sensor NetworksHela Maddar, Wafa Kammoun, Omar Cheikhrouhou, Habib Youssef. 548-553 [doi]
- Predicting Attack Prone Software Components using Repository Mined Change MetricsDaniel D. Hein, Hossein Saiedian. 554-563 [doi]