1 | -- | 0 | Frédéric Cuppens, Nora Cuppens-Boulahia, Ernesto Damiani, Radu State, Joaquín García-Alfaro, Nadia Tawbi. Editorial |
2 | -- | 13 | Nizar Kheir. Behavioral classification and detection of malware through HTTP user agent anomalies |
14 | -- | 29 | William M. Fitzgerald, Ultan Neville, Simon N. Foley. MASON: Mobile autonomic security for network access controls |
30 | -- | 44 | Frédéric Cuppens, Nora Cuppens-Boulahia, Meriam Ben-Ghorbel-Talbi, Stephane Morucci, Nada Essaouni. Smatch: Formal dynamic session management model for RBAC |
45 | -- | 52 | Palaniappan Shamala, Rabiah Ahmad, Mariana Yusoff. A conceptual framework of info structure for information security risk assessment (ISRA) |
53 | -- | 67 | Sherif Saad, Issa Traoré. Semantic aware attack scenarios reconstruction |
68 | -- | 82 | Tahsin Arafat Reza, Michel Barbeau. QaASs: QoS aware adaptive security scheme for video streaming in MANETs |
83 | -- | 95 | Hadi Ahmadi, Reihaneh Safavi-Naini. Message transmission and key establishment: General equality for weak and strong capacities |