Abstract is missing.
- A Recommender-Based System for Assisting Non-technical Users in Managing Android PermissionsArnaud Oglaza, Romain Laborde, Abdelmalek Benzekri, François Barrère. 1-9 [doi]
- No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at LargeWilfried Mayer, Aaron Zauner, Martin Schmiedecker, Markus Huber. 10-20 [doi]
- Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical AttacksJose Rubio-Hernan, Luca De Cicco, Joaquín García-Alfaro. 21-28 [doi]
- Byzantine Set-Union Consensus Using Efficient Set ReconciliationFlorian Dold, Christian Grothoff. 29-38 [doi]
- k-Times Full Traceable Ring SignatureXavier Bultel, Pascal Lafourcade 0001. 39-48 [doi]
- Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side ChannelsJohannes Bauer 0004, Felix C. Freiling. 49-58 [doi]
- POTR: Practical On-the-Fly Rejection of Injected and Replayed 802.15.4 FramesKonrad-Felix Krentz, Christoph Meinel, Maxim Schnjakin. 59-68 [doi]
- Stopping Amplified DNS DDoS Attacks through Distributed Query Rate SharingSaurabh Verma, Ali Hamieh, Jun Ho Huh, Henrik Holm, Siva Raj Rajagopalan, Maciej Korczynski, Nina H. Fefferman. 69-78 [doi]
- HyperCrypt: Hypervisor-Based Encryption of Kernel and User SpaceJohannes Götzfried, Nico Dorr, Ralph Palutke, Tilo Müller. 79-87 [doi]
- Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage SystemDenise Demirel, Stephan Krenn, Thomas Lorünser, Giulia Traverso. 88-97 [doi]
- Introducing Proxy Voting to HeliosOksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer. 98-106 [doi]
- ARTIST: The Android Runtime Instrumentation ToolkitLukas Dresel, Mykolai Protsenko, Tilo Müller. 107-116 [doi]
- Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade ControllersPal-Stefan Murvay, Alexandru Matei, Cristina Solomon, Bogdan Groza. 117-126 [doi]
- Using Expert Systems to Statically Detect "Dynamic" Conflicts in XACMLBernard Stepien, Amy A. Felty. 127-136 [doi]
- Selection of Mitigation Actions Based on Financial and Operational Impact AssessmentsGustavo Gonzalez Granadillo, Alexander Motzek, Joaquín García-Alfaro, Hervé Debar. 137-146 [doi]
- A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlowMehdi Nobakht, Vijay Sivaraman, Roksana Boreli. 147-156 [doi]
- Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor NetworksLyes Bayou, Nora Cuppens-Boulahia, David Espes, Frédéric Cuppens. 157-166 [doi]
- Role Mining with Missing ValuesSokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone. 167-176 [doi]
- Towards a Systemic Approach for Information Security Risk ManagementYannick Naudet, Nicolas Mayer, Christophe Feltus. 177-186 [doi]
- Towards a Metamodel for SABSA Conceptual Architecture DescriptionsPatrick Pleinevaux. 187-194 [doi]
- Threat Modelling Service Security as a Security CeremonyTaciane Martimiano, Jean Everson Martina. 195-204 [doi]
- Access Control and Data Separation Metrics in Cloud InfrastructuresBernd Jäger, Reiner Kraft, Sebastian Luhn, Annika Selzer, Ulrich Waldmann. 205-210 [doi]
- IFCaaS: Information Flow Control as a Service for Cloud SecurityMarwa Elsayed, Mohammad Zulkernine. 211-216 [doi]
- Your Cloud in My Company: Modern Rights Management Services RevisitedMartin Grothe, Christian Mainka, Paul Rösler, Johanna Jupke, Jan Kaiser, Jörg Schwenk. 217-222 [doi]
- A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood EventsAlexandr Vasenev, Lorena Montoya, Andrea Ceccarelli. 223-228 [doi]
- Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark WebChristos Iliou, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris. 229-234 [doi]
- The Case for RAID 4: Cloud-RAID Integration with Local StorageChristopher Hansen, James Archibald. 235-240 [doi]
- An Empirical Study on GSN Usage Intention: Factors Influencing the Adoption of Geo-Social NetworksEsma Aïmeur, Sébastien Gambs, Cheu Yien Yep. 241-246 [doi]
- Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming ServicesProsanta Gope, Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek. 247-252 [doi]
- Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve CryptosystemToan-Thinh Truong, Duong-Tien Phan, Minh-Triet Tran, Anh Duc Duong, Isao Echizen. 253-259 [doi]
- Synchronous One Time Biometrics with Pattern Based AuthenticationPatrick Lacharme, Christophe Rosenberger. 260-265 [doi]
- V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse EngineeringAntonio M. Espinoza, Jeffrey Knockel, Pedro Comesaña Alfaro, Jedidiah R. Crandall. 266-271 [doi]
- Usable Privacy-Aware Logging for Unstructured Log EntriesChristof Rath. 272-277 [doi]
- pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling ApproachPontus Johnson, Alexandre Vernotte, Mathias Ekstedt, Robert Lagerström. 278-283 [doi]
- The Landscape of Domain Name Typosquatting: Techniques and CountermeasuresJeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen. 284-289 [doi]
- Caller-Centrality: Identifying Telemarketers in a VoIP NetworkMuhammad Ajmal Azad, Syed Khurram Rizvi. 290-295 [doi]
- Collaborative Attribute Retrieval in Environment with Faulty Attribute ManagersMario Faiella, Fabio Martinelli, Paolo Mori, Andrea Saracino, Mina Sheikhalishahi. 296-303 [doi]
- Recognizing Time-Efficiently Local Botnet Infections - A Case StudyTanja Heuer, Ina Schiering, Frank Klawnn, Alexander Gabel, Martin Seeger. 304-311 [doi]
- VoIP Profiler: Profiling Voice over IP User Communication BehaviorSainath Batthala, Mayank Swarnkar, Neminath Hubballi, Maitreya Natu. 312-320 [doi]
- Identification and Analysis of Email and Contacts Artefacts on iOS and OS XKenneth M. Ovens, Gordon Morison. 321-327 [doi]
- Extraction and Analysis of Volatile Memory in Android Systems: An Approach Focused on Trajectory Reconstruction Based on NMEA 0183 StandardJoao Paulo Claudino de Sousa, João José Costa Gondim. 328-337 [doi]
- Digital Forensic Artifacts of the Cortana Device Search Cache on Windows 10 DesktopPatrício Domingues, Miguel Frade. 338-344 [doi]
- A Forensic Acquisition and Analysis System for IaaS: Architectural Model and ExperimentSaad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich. 345-354 [doi]
- A Log-Structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the CloudManabu Hirano, Hiromu Ogawa. 355-364 [doi]
- Notary-Assisted Certificate Pinning for Improved Security of Android AppsGeorg Merzdovnik, Damjan Buhov, Artemios G. Voyiatzis, Edgar R. Weippl. 365-371 [doi]
- Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic FeaturesAlberto Ferrante, Eric Medvet, Francesco Mercaldo, Jelena Milosevic, Corrado Aaron Visaggio. 372-381 [doi]
- Lightweight Encryption for Smart HomeSanaah Al Salami, Joonsang Baek, Khaled Salah, Ernesto Damiani. 382-388 [doi]
- Hand Dynamics for Behavioral User AuthenticationFuensanta Torres Garcia, Katharina Krombholz, Rudolf Mayer, Edgar R. Weippl. 389-398 [doi]
- Law Enforcement Access to Password Protected and/or Encrypted Mobile DataMurdoch Watney. 399-405 [doi]
- Towards Digital Investigation in Virtual Networks: A Study of Challenges and Open ProblemsDaniel Spiekermann, Tobias Eggendorfer. 406-413 [doi]
- Threat from Within: Case Studies of Insiders Who Committed Information Technology SabotageJason W. Clark. 414-422 [doi]
- Malware in Pirated Software: Case Study of Malware Encounters in Personal ComputersS. Kumar, L. Madhavan, M. Nagappan, B. Sikdar. 423-427 [doi]
- Towards a Unified Secure Cloud Service Development and Deployment Life-CycleAleksandar Hudic, Matthias Flittner, Thomas Lorünser, Philipp M. Radl, Roland Bless. 428-436 [doi]
- A Security Game Model for Remote Software ProtectionNicola Basilico, Andrea Lanzi, Mattia Monga. 437-443 [doi]
- SPARER: Secure Cloud-Proof Storage for e-Health ScenariosGabriela Gheorghe, Muhammad Rizwan Asghar, Jean Lancrenon, Sankalp Ghatpande. 444-453 [doi]
- How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and DetectionNikhil Tripathi, Neminath Hubballi, Yogendra Singh. 454-463 [doi]
- A Type System for Quantified Information-Flow Security in Java-Like LanguagesGohar Shakoori, Mehran S. Fallah, Zeinab Iranmanesh. 464-473 [doi]
- On Analyzing Program Behavior under Fault Injection AttacksJakub Breier. 474-479 [doi]
- Authentication in the Context of E-Participation: Current Practice, Challenges and RecommendationsMaria Leitner, Arndt Bonitz. 480-485 [doi]
- Air Traffic Management Security Research in SESARJohn Hird, Martin Hawley, Chris Machin. 486-492 [doi]
- A New Vision for ATM Security Management: The Security Management PlatformClaudio Porretti, Raoul Lahaije, Denis Kolev. 493-498 [doi]
- 'CTRL_S' - A Security Tool for SESAR's Design-In Security ApproachKarol Gotz, Martin Hawley, Chris Machin, John Hird. 499-502 [doi]
- Security Risk Assessment and Risk Treatment for Integrated Modular CommunicationHamid Asgari, Sarah Haines, Adrian Waller. 503-509 [doi]
- Cyber Security Incident Management in the Aviation DomainMartin Gilje Jaatun, Rainer Koelle. 510-516 [doi]
- A Model-Based Approach for Aviation Cyber Security Risk AssessmentTobias Kiesling, Matias Krempel, Josef Niederl, Jürgen Ziegler. 517-525 [doi]
- Security Testing with Controller-Pilot Data Link CommunicationsDoris di Marco, Alessandro Manzo, Marco Ivaldi, John Hird. 526-531 [doi]
- Addressing Security in the ATM Environment: From Identification to Validation of Security Countermeasures with Introduction of New Security Capabilities in the ATM System ContextPatrizia Montefusco, Rosana Casar, Rainer Koelle, Tim H. Stelkens-Kobsch. 532-541 [doi]
- SecDevOps: Is It a Marketing Buzzword? - Mapping Research on Security in DevOpsVaishnavi Mohan, Lotfi Ben Othmane. 542-547 [doi]
- An Empirical Study on the Relationship between Software Security Skills, Usage and Training Needs in Agile SettingsTosin Daniel Oyetoyan, Daniela Soares Cruzes, Martin Gilje Jaatun. 548-555 [doi]
- Case Study of Security Development in an Agile Environment: Building Identity Management for a Government AgencyKalle Rindell, Sami Hyrynsalmi, Ville Leppänen. 556-563 [doi]
- Towards Effective Security Assurance for Incremental Software Development the Case of Zen Cart ApplicationLotfi Ben Othmane, Azmat Ali. 564-571 [doi]
- Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security RequirementsChad Heitzenrater, Andrew C. Simpson. 572-581 [doi]
- Agile Team Members Perceptions on Non-functional Testing: Influencing Factors from an Empirical StudyCristina Rosa Camacho, Sabrina Marczak, Daniela S. Cruzes. 582-589 [doi]
- A Peek under the Hood of iOS MalwareLaura Garcia, Ricardo J. Rodriguez. 590-598 [doi]
- What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity MalwareEnrico Mariconti, Jeremiah Onaolapo, Gordon-Ross, Gianluca Stringhini. 599-608 [doi]
- Exploring the Usage of Topic Modeling for Android Malware Static AnalysisEric Medvet, Francesco Mercaldo. 609-617 [doi]
- Classification of Short Messages Initiated by Mobile MalwareMarián Kühnel, Ulrike Meyer. 618-627 [doi]
- Ransomware Inside OutFrancesco Mercaldo, Vittoria Nardone, Antonella Santone. 628-637 [doi]
- Detecting Packed Executable File: Supervised or Anomaly Detection Method?Neminath Hubballi, Himanshu Dogra. 638-643 [doi]
- The Perfect Storm: The Privacy Paradox and the Internet-of-ThingsMeredydd Williams, Jason R. C. Nurse, Sadie Creese. 644-652 [doi]
- Privacy Impact Assessment Template for ProvenanceJenni Reuben, Leonardo A. Martucci, Simone Fischer-Hübner, Heather S. Packer, Hans Hedbom, Luc Moreau. 653-660 [doi]
- Major Challenges in Structuring and Institutionalizing CERT-CommunicationOtto Hellwig, Gerald Quirchmayr, Edith Huber, Gernot Goluch, Franz Vock, Bettina Pospisil. 661-667 [doi]
- Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical InfrastructuresThomas Schaberreiter, Gerald Quirchmayr, Anna-Maija Juuso, Moussa Ouedraogo, Juha Röning. 668-676 [doi]
- Privacy Preserving Computations for Viral Marketing: The Case of Rational PlayersRica Gonen, Tamir Tassa. 677-686 [doi]
- Protecting Sensitive Information in the Volatile Memory from Disclosure AttacksStefanos Malliaros, Christoforos Ntantogian, Christos Xenakis. 687-693 [doi]
- The Value of Online Users: Empirical Evaluation of the Price of Personalized AdsMiriam Marciel, Jose Gonzalez, Yonas Mitike Kassa, Roberto Gonzalez, Mohamed Ahmed. 694-700 [doi]
- Your Data in the Eyes of the Beholders: Design of a Unified Data Valuation Portal to Estimate Value of Personal Information from Market PerspectiveYonas Mitike Kassa, Jose Gonzalez, Ángel Cuevas, Rubén Cuevas Rumín, Miriam Marciel, Roberto Gonzalez. 701-705 [doi]
- Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licensing CapabilitiesKwstantinos Papadamou, Riginos Samaras, Michael Sirivianos. 706-714 [doi]
- FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and AuthenticationLuigi Stammati, Claudio Pisa, Tooska Dargahi, Alberto Caponi, Giuseppe Bianchi. 715-724 [doi]
- Automated Issuance of Digital Certificates through the Use of FederationsThaís Bardini Idalino, Marina Coelho, Jean Everson Martina. 725-732 [doi]
- PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud ServicesThomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls. 733-741 [doi]
- CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data SharingFelix Hörandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, Bernd Zwattendorfer. 742-749 [doi]
- Towards Secure Collaboration in Federated Cloud EnvironmentsBojan Suzic, Andreas Reiter. 750-759 [doi]
- Cryptographically Enforced Four-Eyes PrincipleArne Bilzhause, Manuel Huber, Henrich C. Pöhls, Kai Samelin. 760-767 [doi]
- Co-creating Security-and-Privacy-by-Design SystemsSauro Vicini, Francesco Alberti, Nicolás Notario, Alberto Crespo, Juan Ramón Troncoso-Pastoriza, Alberto Sanna. 768-775 [doi]
- Tackling the Cloud Adoption Dilemma - A User Centric Concept to Control Cloud Migration Processes by Using Machine Learning TechnologiesMichael Diener, Leopold Blessing, Nina Rappel. 776-785 [doi]
- The Slandail Monitor: Real-Time Processing and Visualisation of Social Media Data for Emergency ManagementXiubo Zhang, Stephen Kelly, Khurshid Ahmad. 786-791 [doi]
- Ensuring Security of Data and Information Flow in Emergency Response Decision SupportDamian Jackson, Paul Hayes. 792-797 [doi]
- Legal Implications of Using Social Media Data in Emergency ResponseChristian Berger, Paolo de Stefani, Taiwo Oriola. 798-799 [doi]
- Disaster-Related Public Speeches: The Role of EmotionsMaria Spyropoulou, Khurshid Ahmad. 800-804 [doi]
- The Application of Social Media Image Analysis to an Emergency Management SystemMin Jing, Bryan W. Scotney, Sonya A. Coleman, T. Martin McGinnity. 805-810 [doi]
- Computational, Communicative, and Legal Conditions for Using Social Media in Disaster Management in GermanySabine Grunder-Fahrer, Christian Berger, Antje Schlaf, Gerhard Heyer. 811-820 [doi]
- Involving End Users into Collaborative Software Development: The Showcase of CloudTeamsSebastian Franken, Sabine Kolvenbach, Wolfgang Gräther. 821-826 [doi]
- Social Analytics in an Enterprise Context: From Manufacturing to Software DevelopmentEvangelos Arvanitakis, Michael Petychakis, Evmorfia Biliri, Ariadni Michalitsi-Psarrou, Panagiotis Kokkinakos, Fenareti Lampathaki, Dimitrios Askounis. 827-833 [doi]
- SmartNet: Secure Content Sharing for Peer-to-Peer Smart Group SpacesBrian Greaves, Marijke Coetzee. 834-843 [doi]
- Geographic Localization of an Anonymous Social Network Message Data SetAlexander Bohm, Benjamin Taubmann, Hans P. Reiser. 844-850 [doi]
- Using Crowdsourced and Anonymized Personas in the Requirements Elicitation and Software Development Phases of Software EngineeringIosif Alvertis, Dimitris Papaspyros, Sotiris Koussouris, Spyros Mouzakitis, Dimitris Askounis. 851-856 [doi]