1 | -- | 4 | Uma Chandrashekhar, Scott Nelson. Delivering Network Assurance Through Secure and Reliable Solutions |
5 | -- | 16 | Matt Bowles. The Business of Hacking and Birth of an Industry |
17 | -- | 36 | Suhasini V. Sabnis, Marc Verbruggen, John Hickey, Alan J. McBride. Intrinsically Secure Next-Generation Networks |
37 | -- | 59 | Abhaya Asthana, Kazu Okumoto. Integrative Software Design for Reliability: Beyond Models and Defect Prediction |
61 | -- | 78 | Wael Kanoun, Samuel Dubus, Serge Papillon, Nora Cuppens-Boulahia, Frédéric Cuppens. Towards Dynamic Risk Management: Success Likelihood of Ongoing Attacks |
79 | -- | 86 | Andrew R. McGee, Matthieu Coutière, Maria E. Palamara. Public Safety Network Security Considerations |
87 | -- | 103 | Alan J. McBride, Andrew R. McGee. Assessing Smart Grid Security |
105 | -- | 111 | Suhasini V. Sabnis, Doug Charles. Opportunities and Challenges: Security in eHealth |
113 | -- | 128 | Pasquale Donadio. Virtual Intrusion Detection Systems in the Cloud |
129 | -- | 133 | Marcel Mampaey, Álvaro Nunez Villegas. A Network-Centric DRM For Online Scenarios |
135 | -- | 146 | Vladimir Kolesnikov, Abdullatif Shikfa. On The Limits of Privacy Provided by Order-Preserving Encryption |
147 | -- | 155 | Juan Ceballos, Richard DiPasquale, Robert Feldman. Business Continuity and Security in Datacenter Interconnection |
157 | -- | 173 | Ioannis Broustis, Ganapathy S. Sundaram, Harish Viswanathan. Group Authentication: A New Paradigm for Emerging Applications |
175 | -- | 191 | Violeta Cakulev, Ioannis Broustis, Ganapathy S. Sundaram. Secure Enablement of Real Time Applications: A Novel End-to-End Approach |
193 | -- | 212 | Laurent Ciavaglia, Samir Ghamri-Doudane, Mikhail Smirnov, Panagiotis Demestichas, Vera-Alexandra Stavroulaki, Aimilia Bantouna, Berna Sayraç. Unifying Management of Future Networks With Trust |