163 | -- | 164 | Shujun Li, Konrad Rieck, Alan Woodward. Special issue on threat detection, analysis and defense |
165 | -- | 181 | Stéphane Paul, Raphaël Vignon-Davillier. Unifying traditional risk assessment approaches with attack trees |
182 | -- | 193 | Fabrizio Baiardi, Fabio Corò, Federico Tonelli, Daniele Sgandurra. Automating the assessment of ICT risk |
194 | -- | 208 | Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li. PeerRush: Mining for unwanted P2P traffic |
209 | -- | 223 | Martin Johns. Script-templates for the Content Security Policy |
224 | -- | 244 | Jason C. Cohen, Subrata Acharya. Towards a trusted HDFS storage platform: Mitigating threats to Hadoop infrastructures using hardware-accelerated encryption with TPM-rooted key protection |
245 | -- | 255 | Saman Salehi, M. A. Balafar. Visual multi secret sharing by cylindrical random grid |