Abstract is missing.
- Foreword from the Conference ChairsSabrina De Capitani di Vimercati, Pierangela Samarati, Sara Foresti, Jiankun Hu. [doi]
- A misuse-based network Intrusion Detection System using Temporal Logic and stream processingAbdulbasit Ahmed, Alexei Lisitsa, Clare Dixon. 1-8 [doi]
- A holistic methodology for evaluating wireless Intrusion Detection SystemsKhalid Nasr, Anas Abou El Kalam, Christian Fraboul. 9-16 [doi]
- A grid-based clustering for low-overhead anomaly intrusion detectionYang Zhong, Hirofumi Yamaki, Hiroki Takakura. 17-24 [doi]
- Towards ground truthing observations in gray-box anomaly detectionJiang Ming, Haibin Zhang, Debin Gao. 25-32 [doi]
- Defeating pharming attacks at the client-sideSophie Gastellier-Prevost, Maryline Laurent. 33-40 [doi]
- Automated extraction of polymorphic virus signatures using abstract interpretationSerge Chaumette, Olivier Ly, Renaud Tabary. 41-48 [doi]
- Modeling worms propagation on probabilityYini Wang, Sheng Wen, Yang Xiang. 49-56 [doi]
- Detecting infection onset with behavior-based policiesKui Xu, Danfeng Yao, Qiang Ma, Alexander Crowell. 57-64 [doi]
- KL-F: Karhunen-Loève based fragile watermarkingMarco Botta, Davide Cavagnino, Victor Pomponiu. 65-72 [doi]
- Designing secure RFID authentication protocols is (still) a non-trivial taskPanagiotis Rizomiliotis, Evangelos Rekleitis, Stefanos Gritzalis. 73-80 [doi]
- Make mine a quadruple: Strengthening the security of graphical one-time PIN authenticationRavi Jhawar, Philip Inglesant, Nicolas Courtois, Martina Angela Sasse. 81-88 [doi]
- Privacy-enhanced identity via browser extensions and linking servicesRenato Accornero, Daniele Rispoli, Francesco Bergadano. 89-96 [doi]
- Reactive non-interference for a browser modelNataliia Bielova, Dominique Devriese, Fabio Massacci, Frank Piessens. 97-104 [doi]
- Tracking end-users in web databasesBoris Rozenberg, Yaron Gonen, Ehud Gudes, Nurit Gal-Oz, Erez Shmueli. 105-112 [doi]
- CloudSec: A security monitoring appliance for Virtual Machines in the IaaS cloud modelAmani S. Ibrahim, James H. Hamlyn-Harris, John Grundy, Mohamed Almorsy. 113-120 [doi]
- An efficient VM-based software protectionAmir Averbuch, Michael Kiperberg, Nezer Zaidenberg. 121-128 [doi]
- Removing the blinders: Using information to mitigate adversaries in adaptive overlaysDavid Zage, Charles Edwin Killian, Cristina Nita-Rotaru. 129-136 [doi]
- Improving P2P IPTV random peers search through user similarityAlessio Bonti, Ming Li, Wen Shi. 137-144 [doi]
- A distributed client-puzzle mechanism to mitigate bandwidth attacksMazdak Alimadadi, Mehran S. Fallah. 145-152 [doi]
- Towards safe and optimal filtering rule reordering for complex packet filtersNizar Ben Neji, Adel Bouhoula. 153-160 [doi]
- DANAK: Finding the odd!Cynthia Wagner, Jérôme François, Radu State, Thomas Engel. 161-168 [doi]
- A novel semi-supervised approach for network traffic clusteringYu Wang, Yang Xiang, Jun Zhang, Shun-Zheng Yu. 169-175 [doi]
- Scalable consistency-based hardware trojan detection and diagnosisSheng Wei, Miodrag Potkonjak. 176-183 [doi]
- FORTUNA - A probabilistic framework for early design stages of hardware-based secure systemsRoberto Gallo, Henrique Kawakami, Ricardo Dahab. 184-191 [doi]
- Attack-resilient compliance monitoring for large distributed infrastructure systemsMirko Montanari, Roy H. Campbell. 192-199 [doi]
- A secure, constraint-aware role-based access control interoperation frameworkNathalie Baracaldo, Amirreza Masoumzadeh, James Joshi. 200-207 [doi]
- Model-based safety analysis of SELinux security policiesPeter Amthor, Winfried E. Kühnhauser, Anja Pölck. 208-215 [doi]
- Exploring twisted paths: Analyzing authorization processes in organizationsSteffen Bartsch. 216-223 [doi]
- SMS linguistic profiling authentication on mobile deviceHataichanok Saevanee, Nathan L. Clarke, Steven Furnell. 224-228 [doi]
- User-representative feature selection for keystroke dynamicsEesa Al Solami, Colin Boyd, Andrew J. Clark, Irfan Ahmed. 229-233 [doi]
- STORK e-privacy and securityV. Koulolias, A. Kountzeris, Herbert Leitold, Bernd Zwattendorfer, A. Crespo, M. Stern. 234-238 [doi]
- Towards a metric for recognition-based graphical password securityRosanne English, Ron Poet. 239-243 [doi]
- RCHB: Light-weight, provably-secure variants of the HB protocol using rotation and complementationSamia A. Ali, Refaat M. Mohamed, Mahmoud H. Fahim. 244-248 [doi]
- A Trustful Authentication and Key Exchange Scheme (TAKES) for ad hoc networksTony Cheneau, Andrei Vlad Sambra, Maryline Laurent. 249-253 [doi]
- Automatic security verification for 3-party authentication and key exchange protocolsHaruki Ota, Shinsaku Kiyomoto, Yutaka Miyake. 254-258 [doi]
- On the security of the ECKE-1N and EECKE-1N elliptic-curve key agreement protocolsMaurizio Adriano Strangio. 259-263 [doi]
- Channel state information based key generation vs. side-channel analysis key information leakageHuiyun Li, Qi Zhang, Hai Yuan. 264-268 [doi]
- A microcontroller SRAM-PUFChristoph Böhm 0003, Maximilian Hofer, Wolfgang Pribyl. 269-273 [doi]
- Data control in social networksRobert Koch, Dominik Holzapfel, Gabi Dreo Rodosek. 274-279 [doi]
- Trustable outsourcing of business processes to cloud computing environmentsSami Alsouri, Stefan Katzenbeisser, Sebastian Biedermann. 280-284 [doi]
- Secure conjunctive keyword searches for unstructured textFlorian Kerschbaum. 285-289 [doi]
- The power of credit card numbers and long CVVsValentim Oliveira, Tito Silva. 290-294 [doi]
- A privacy-preserving eID based Single Sign-On solutionBernd Zwattendorfer, Arne Tauber, Thomas Zefferer. 295-299 [doi]
- Enhancement of ZigBee and Wi-Fi security by a robust and fast chaotic algorithmBassem Bakhache, Joseph Ghazal, Safwan El Assad. 300-304 [doi]
- Flooding attacks against network coding and countermeasuresYuanyuan Zhang, Wassim Znaidi, Cédric Lauradoux, Marine Minier. 305-309 [doi]
- Avoiding DDoS with active management of backlog queuesMartine Bellaïche, Jean-Charles Grégoire. 310-315 [doi]
- 5N: Randomized recursive routing for restricted-route networksNathan S. Evans, Christian Grothoff. 316-321 [doi]
- Analysis of prefix hijacking based on AS hierarchical modelBofeng Zhang, Yuan Li, Yujing Liu, Jinshu Su. 322-326 [doi]
- Modelling self-protected networks and dynamic systemsMarta Fernández-Diego, Julián Marcelo-Cocho. 327-331 [doi]
- A conceptual framework for evaluating usable security in authentication mechanisms - usability perspectivesMartin Mihajlov, Saso Josimovski, Borka Jerman-Blazic. 332-336 [doi]
- Usability of Internet Security Software: Have they got it right?Patryk Szewczyk. 337-341 [doi]
- Semi-supervised learning for packed executable detectionXabier Ugarte-Pedrero, Igor Santos, Pablo Garcia Bringas, Mikel Gastesi, José Miguel Esparza. 342-346 [doi]
- A propagation model of a vulnerability mitigation computer worm - seawaveZiyad S. Al-Salloum, Stephen D. Wolthusen. 347-352 [doi]
- Towards improving security testability of AADL architecture modelsAyda Saïdane, Nicolas Guelfi. 353-357 [doi]
- Reconstructing security types for automated policy enforcement in FABLEArash Afshar, Mehran S. Fallah. 358-363 [doi]
- Measuring the revised guessability of graphical passwordsRosanne English, Ron Poet. 364-368 [doi]