Abstract is missing.
- Argumentation-Based Group Decision Support for Collectivist CommunitiesMarijke Coetzee. 1-16 [doi]
- A Knowledge Integration Approach for Safety-Critical Software Development and Operation Based on the Method ArchitectureShuichiro Yamamoto. 17-28 [doi]
- Metrics-Based Incremental Determinization of Finite AutomataSergiu I. Balan, Gianfranco Lamperti, Michele Scandale. 29-44 [doi]
- Towards Developing Secure Software Using Problem-Oriented Security PatternsAzadeh Alebrahim, Maritta Heisel. 45-62 [doi]
- Visual Analytics for Detecting Anomalous Activity in Mobile Money Transfer ServicesEvgenia Novikova, Igor V. Kotenko. 63-78 [doi]
- A Review of Security Requirements Engineering Methods with Respect to Risk Analysis and Model-Driven EngineeringDenisse Muñante, Vanea Chiprianov, Laurent Gallon, Philippe Aniorté. 79-93 [doi]
- Adaptive User-Centered SecuritySven Wohlgemuth. 94-109 [doi]
- Mobile Computing is not Always Advantageous: Lessons Learned from a Real-World Case Study in a HospitalAndreas Holzinger, Bettina Sommerauer, Peter Spitzer, Simon Juric, Borut Zalik, Matjaz Debevc, Chantal Lidynia, André Calero Valdez, Carsten Röcker, Martina Ziefle. 110-123 [doi]
- Towards Interactive Visualization of Longitudinal Data to Support Knowledge Discovery on Multi-touch Tablet ComputersAndreas Holzinger, Michael Schwarz, Bernhard Ofner, Fleur Jeanquartier, André Calero Valdez, Carsten Röcker, Martina Ziefle. 124-137 [doi]
- Semantic-Aware Mashups for Personal Resources in SemanticLIFE and SocialLIFESao-Khue Vo, Amin Anjomshoaa, A. Min Tjoa. 138-154 [doi]
- Trust Extension Protocol for Authentication in Networks Oriented to Management (TEPANOM)Antonio J. Jara. 155-165 [doi]
- Building an Initialization Cipher Block with Two-Dimensional Operation and Random ParametersYi-Li Huang, Fang-Yie Leu, Ilsun You, Jing-Hao Yang. 166-171 [doi]
- Crypto-Biometric Models for Information SecrecyMarek R. Ogiela, Lidia Ogiela, Urszula Ogiela. 172-178 [doi]
- One-Time Biometrics for Online Banking and Electronic Payment AuthenticationAude Plateaux, Patrick Lacharme, Audun Jøsang, Christophe Rosenberger. 179-193 [doi]
- Expert Knowledge Based Design and Verification of Secure Systems with Embedded DevicesVasily Desnitsky, Igor V. Kotenko. 194-210 [doi]
- PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring FunctionsShinsaku Kiyomoto, Yutaka Miyake. 211-225 [doi]
- Detection of Malicious Web Pages Using System Calls SequencesGerardo Canfora, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio. 226-238 [doi]
- Risk Reduction Overview - A Visualization Method for Risk ManagementHellen Nanda Janine Havinga, Olivier Diederik Theobald Sessink. 239-249 [doi]
- Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime FunctionWolfgang Boehmer. 250-256 [doi]
- A High-Speed Network Content Filtering SystemGuohong Zhao, Shuhui Chen, BaoKang Zhao, Ilsun You, Jinshu Su, Wanrong Yu. 257-269 [doi]
- Feature Grouping for Intrusion Detection System Based on Hierarchical ClusteringJingping Song, Zhiliang Zhu, Chris Price. 270-280 [doi]
- Towards a Key Consuming Detection in QKD-VoIP SystemsGuohong Zhao, Wanrong Yu, BaoKang Zhao, Chunqing Wu. 281-285 [doi]
- A Structure P2P Based Web Services Registry with Access and ControlQian He, BaoKang Zhao, Yunjian Long, Jinshu Su, Ilsun You. 286-297 [doi]
- Amplification DDoS Attacks: Emerging Threats and Defense StrategiesAntonio Colella, Clara Maria Colombini. 298-310 [doi]