Abstract is missing.
- A Case Study in Malware Research Ethics Education: When Teaching Bad is GoodJohn P. Sullins. 1-4 [doi]
- Ethics in Data Sharing: Developing a Model for Best PracticeSven Dietrich, Jeroen van der Ham, Aiko Pras, Roland van Rijswijk-Deij, Darren Shou, Anna Sperotto, Aimee van Wynsberghe, Lenore D. Zuck. 5-9 [doi]
- Gringotts: Securing Data for Digital EvidenceCatherine M. S. Redfield, Hiroyuki Date. 10-17 [doi]
- P2U: A Privacy Policy Specification Language for Secondary Data Sharing and UsageJohnson Iyilade, Julita Vassileva. 18-22 [doi]
- Architecture, Workflows, and Prototype for Stateful Data Usage Control in CloudAliaksandr Lazouski, Gaetano Mancini, Fabio Martinelli, Paolo Mori. 23-30 [doi]
- Resilience as a New Enforcement Model for IT Security Based on Usage ControlSven Wohlgemuth. 31-38 [doi]
- Structure Matters - A New Approach for Data Flow TrackingEnrico Lovat, Florian Kelbert. 39-43 [doi]
- Hurdles for Genomic Data Usage ManagementMuhammad Naveed. 44-48 [doi]
- RAPPD: A Language and Prototype for Recipient-Accountable Private Personal DataYuan J. Kang, Allan M. Schiffman, Jeff Shrager. 49-56 [doi]
- DF-C2M2: A Capability Maturity Model for Digital Forensics OrganisationsEbrahim Hamad Al Hanaei, Awais Rashid. 57-60 [doi]
- Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation PropagationXin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas Lee Schales, Jiyong Jang, Reiner Sailer. 61-64 [doi]
- Collusion and Fraud Detection on Electronic Energy Meters - A Use Case of Forensics Investigation ProceduresRubens Alexandre De Faria, Keiko Verônica Ono Fonseca, Bertoldo Schneider, Sing Kiong Nguang. 65-68 [doi]
- Towards Forensic Analysis of Attacks with DNSSECHaya Shulman, Michael Waidner. 69-76 [doi]
- The Tricks of the Trade: What Makes Spam Campaigns Successful?Jane Iedemska, Gianluca Stringhini, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna. 77-83 [doi]
- Constructing and Analyzing Criminal NetworksHamed Sarvari, Ehab Abozinadah, Alex Mbaziira, Damon McCoy. 84-91 [doi]
- Steganography in Long Term Evolution SystemsIwona Grabska, Krzysztof Szczypiorski. 92-99 [doi]
- Improving Hard Disk Contention-Based Covert Channel in Cloud ComputingBartosz Lipinski, Wojciech Mazurczyk, Krzysztof Szczypiorski. 100-107 [doi]
- PeerShark: Detecting Peer-to-Peer Botnets by Tracking ConversationsPratik Narang, Subhajit Ray, Chittaranjan Hota, Venkat Venkatakrishnan. 108-115 [doi]
- Automatic Identification of Replicated Criminal Websites Using Combined ClusteringJake Drew, Tyler Moore. 116-123 [doi]
- iCOP: Automatically Identifying New Child Abuse Media in P2P NetworksClaudia Peersman, Christian Schulze, Awais Rashid, Margaret Brennan, Carl Fischer. 124-131 [doi]
- Can We Identify NAT Behavior by Analyzing Traffic Flows?Yasemin Gokcen, Vahid Aghaei Foroushani, A. Nur Zincir-Heywood. 132-139 [doi]
- Mind Your Language(s): A Discussion about Languages and SecurityEric Jaeger, Olivier Levillain. 140-151 [doi]
- LEGO(TM) Bricks for Reactive ProgrammingDennis M. Volpano. 152-157 [doi]
- Nail: A Practical Interface Generator for Data FormatsJulian Bangert, Nickolai Zeldovich. 158-166 [doi]
- Ethos' Deeply Integrated Distributed TypesW. Michael Petullo, Wenyuan Fei, Jon A. Solworth, Pat Gavlin. 167-180 [doi]
- Phantom Boundaries and Cross-Layer Illusions in 802.15.4 Digital RadioTravis Goodspeed. 181-184 [doi]
- Finite State Machine Parsing for Internet Protocols: Faster Than You ThinkRobert David Graham, Peter C. Johnson. 185-190 [doi]
- Parsifal: A Pragmatic Solution to the Binary Parsing ProblemsOlivier Levillain. 191-197 [doi]
- The Pitfalls of Protocol Design: Attempting to Write a Formally Verified PDF ParserAndreas Bogk, Marco Schopl. 198-203 [doi]
- Using Existing Hardware Services for Malware DetectionSarat Kompalli. 204-208 [doi]
- The Weird Machines in Proof-Carrying CodeJulien Vanegue. 209-213 [doi]
- Understanding Insider Threat: A Framework for Characterising AttacksJason R. C. Nurse, Oliver Buckley, Philip A. Legg, Michael Goldsmith, Sadie Creese, Gordon R. T. Wright, Monica T. Whitty. 214-228 [doi]
- Combining Generated Data Models with Formal Invalidation for Insider Threat AnalysisFlorian Kammüller, Christian W. Probst. 229-235 [doi]
- Analysis of Unintentional Insider Threats Deriving from Social Engineering ExploitsFrank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David Mundie, Jennifer Cowley. 236-250 [doi]
- Insider Threat Identification by Process AnalysisMatt Bishop, Heather M. Conboy, Huong Phan, Borislava I. Simidchieva, George S. Avrunin, Lori A. Clarke, Leon J. Osterweil, Sean Peisert. 251-264 [doi]
- Insider Attack Identification and Prevention Using a Declarative ApproachAnandarup Sarkar, Sven Köhler 0003, Sean Riddle, Bertram Ludäscher, Matt Bishop. 265-276 [doi]
- Detecting Unknown Insider Threat ScenariosWilliam T. Young, Alex Memory, Henry G. Goldberg, Ted E. Senator. 277-288 [doi]