1 | -- | 22 | Richard Gay, Heiko Mantel, Henning Sudbrock. An Empirical Bandwidth Analysis of Interrupt-Related Covert Channels |
23 | -- | 46 | Tom Chothia, Chris Novakovic, Rajiv Ranjan Singh. Calculating Quantitative Integrity and Secrecy for Imperative Programs |
47 | -- | 69 | Kristian Beckers, Leanid Krautsevich, Artsiom Yautsiukhin. Using Attack Graphs to Analyze Social Engineering Threats |
70 | -- | 89 | Alessandro Armando, Michele Bezzi, Nadia Metoui, Antonino Sabetta. Risk-Based Privacy-Aware Information Disclosure |
90 | -- | 112 | Gencer Erdogan, Fredrik Seehusen, Ketil Stølen, Jon Hofstad, Jan Øyvind Aagedal. Assessing the Usefulness of Testing for Validating and Correcting Security Risk Models Based on Two Industrial Case Studies |