Abstract is missing.
- PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android DevicesSaeed Ibrahim Alqahtani, Shujun Li. [doi]
- One-Message Unilateral Entity Authentication SchemesAlfredo De Santis, Manuela Flores, Barbara Masucci. [doi]
- Reliable Behavioural Factors in the Information Security ContextPeter Mayer, Alexandra Kunz, Melanie Volkamer. [doi]
- Malware and Formal Methods: Rigorous Approaches for detecting Malicious BehaviourFabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone. [doi]
- Measuring privacy in high dimensional microdata collectionsSpyros Boukoros, Stefan Katzenbeisser 0001. [doi]
- Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic AppsAyman Youssef, Ahmed F. Shosha. [doi]
- FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault toleranceAvinash Srinivasan, Hunter Dong, Angelos Stavrou. [doi]
- Fully threshold broadcast encryptionSigurd Eskeland. [doi]
- Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based ApproachReda Yaich, Nora Cuppens, Frédéric Cuppens. [doi]
- Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFSSebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl. [doi]
- Efficient ID-based Designated Verifier SignatureOlivier Blazy, Emmanuel Conchon, Paul Germouty, Amandine Jambert. [doi]
- VMAttack: Deobfuscating Virtualization-Based Packed BinariesAnatoli Kalysch, Johannes Götzfried, Tilo Müller. [doi]
- Security and Privacy Implications of NFC-enabled Contactless Payment SystemsNicholas Akinyokun, Vanessa Teague. [doi]
- M2M-REP: Reputation of Machines in the Internet of ThingsMuhammad Ajmal Azad, Samiran Bag, Feng Hao. [doi]
- Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting SchemeDavid Bernhard, Oksana Kulyk, Melanie Volkamer. [doi]
- Anomaly Detection for Simulated IEC-60870-5-104 TrafiicErsi Hodo, Stepan Grebeniuk, Henri Ruotsalainen, Paul Tavolato. [doi]
- End-node Fingerprinting for Malware Detection on HTTPS DataTomás Komárek, Petr Somol. [doi]
- Towards DDoS Attack Resilient Wide Area Monitoring SystemsKubilay Demir, Neeraj Suri. [doi]
- Attack Potential in Impact and ComplexityLuca Allodi, Fabio Massacci. [doi]
- Insider Misuse Attribution using BiometricsAbdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell. [doi]
- Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution EnvironmentsCarlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis. [doi]
- JSDES: An Automated De-Obfuscation System for Malicious JavaScriptMoataz AbdelKhalek, Ahmed Shosha. [doi]
- Protecting Future Maritime CommunicationChristian Frøystad, Karin Bernsmed, Per Håkon Meland. [doi]
- A Blockchain-based Approach for Data Accountability and Provenance TrackingRicardo Neisse, Gary Steri, Igor Nai Fovino. [doi]
- Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability ControlTetsuji Takada. [doi]
- Microblogging in a Privacy-Preserving wayNikolaos P. Karvelas, Marius Senftleben, Stefan Katzenbeisser 0001. [doi]
- Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption SchemeMasoomeh Sepehri, Alberto Trombetta. [doi]
- A Low-Cost UAV-Based Secure Location Verification MethodMarco Rasori, Pericle Perazzo, Gianluca Dini. [doi]
- A Non-Parametric Model for Accurate and Provably Private Synthetic Data SetsJordi Soria-Comas, Josep Domingo-Ferrer. [doi]
- An Approach to Botnet Malware Detection Using Nonparametric Bayesian MethodsJoseph DiVita, Roger A. Hallman. [doi]
- Orchestrating Privacy Enhancing Technologies and Services with BPM Tools: The WITDOM Data Protection OrchestratorNicolás Notario, Eleonora Ciceri, Alberto Crespo, Eduardo González Real, Ilio Catallo, Sauro Vicini. [doi]
- Towards the Adoption of Secure Cloud Identity ServicesAlexandros Kostopoulos, Evangelos Sfakianakis, Ioannis P. Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner. [doi]
- Secure Enrollment of Certificates Using Short PINsMichael Rossberg, Markus Theil. [doi]
- Secure Matrix Multiplication with MapReduceXavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade 0001. [doi]
- A Comparative Study on the Scalability of Dynamic Group Key Agreement ProtocolsOrhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan. [doi]
- Security Analysis of Cordova Applications in Google PlayMichiel Willocx, Jan Vossaert, Vincent Naessens. [doi]
- How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security PerspectiveAndrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E. King, Gabe Guss, Yuval Elovici. [doi]
- Investigating User Comprehension and Risk Perception of Apple's Touch ID TechnologyYousra Javed, Mohamed Shehab, Emmanuel Bello-Ogunu. [doi]
- Constrained PET Composition for Measuring Enforced PrivacySebastian Funke, Alexander Wiesmaier, Jörg Daubert. [doi]
- DoS Attacks on Controller Area Networks by Fault Injections from the Software LayerPal-Stefan Murvay, Bogdan Groza. [doi]
- REMI: A Reliable and Secure Multicast Routing Protocol for IoT NetworksMauro Conti, Pallavi Kaliyar, Chhagan Lal. [doi]
- Overcoming Limits of Blockchain for IoT ApplicationsFrancesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera. [doi]
- Memory carving can finally unveil your embedded personal dataThomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger. [doi]
- Adaptive Resource Management Enabling Deception (ARMED)Partha P. Pal, Nathaniel Soule, Nate Lageman, Shane S. Clark, Marco M. Carvalho, Adrian Granados, Anthony Alves. [doi]
- Are Network Covert Timing Channels Statistical Anomalies?Félix Iglesias, Tanja Zseby. [doi]
- Artificial Ambient Environments for Proximity Critical ApplicationsIakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes. [doi]
- Attack Scenario Modeling for Smart Grids Assessment through SimulationAndrea Tundis, Rolf Egert, Max Mühlhäuser. [doi]
- Application of the holistic Data Privacy and Security Framework PaaSword: A focus on the integration in industrial PilotsSebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan. [doi]
- A Trust-based Resilient Routing Mechanism for the Internet of ThingsZeeshan Ali Khan, Johanna Ullrich, Artemios G. Voyiatzis, Peter Herrmann. [doi]
- C'mon: Monitoring the Compliance of Cloud Services to Contracted PropertiesSoha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri. [doi]
- Identification of Dependency-based Attacks on Node.jsBrian Pfretzschner, Lotfi Ben Othmane. [doi]
- On Using TLS to Secure In-Vehicle NetworksDaniel Zelle, Christoph Krauß, Hubert Strauß, Karsten Schmidt. [doi]
- Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT)Tanveer Zia, Peng Liu, Weili Han. [doi]
- Investigating the darknet: limitations in Slovenian legal systemAnze Mihelic, Blaz Markelj, Igor Bernik, Sabina Zgaga. [doi]
- Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log DataMarkus Wurzenberger, Florian Skopik, Max Landauer, Philipp Greitbauer, Roman Fiedler, Wolfgang Kastner. [doi]
- Forensic Image Inspection Assisted by Deep LearningFelix Mayer, Martin Steinebach. [doi]
- DevOps for Better Software Security in the Cloud Invited PaperMartin Gilje Jaatun, Daniela S. Cruzes, Jesus Luna. [doi]
- Learning Android MalwareKhanh-Huu-The Dam, Tayssir Touili. [doi]
- Resource Hints in HTML5: A New Pandora's Box of Security NightmaresNatalija Vlajic, X. Y. Shi, Hamzeh Roumani, Pooria Madani. [doi]
- Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisitionChristopher Meffert, Devon Clark, Ibrahim M. Baggili, Frank Breitinger. [doi]
- ZONESEC: built-in cyber-security for wide area surveillance systemAljosa Pasic, Jose-Ramon Martinez-Salio, Susana Gonzalez Zarzosa, Rodrigo Diaz. [doi]
- The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration ModelAbeer Al Jarrah, Mohamed Shehab. [doi]
- SAFE and Secure: Deeply Integrating Security in a New Hazard AnalysisSam Procter, Eugene Y. Vasserman, John Hatcliff. [doi]
- Victim Communication Stack (VCS): A flexible model to select the Human Attack VectorEnrico Frumento, Federica Freschi, Davide Andreoletti, Angelo Consoli. [doi]
- Towards a Secure SCRUM Process for Agile Web Application DevelopmentPatrik Maier, Zhendong Ma, Roderick Bloem. [doi]
- Provisioning Software with Hardware-Software BindingRobert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram. [doi]
- Systemic Risk Modeling and Evaluation through Simulation and Bayesian NetworksAndrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Saccà, Simona Citrigno, Sabrina Graziano, Max Mühlhäuser. [doi]
- A New Data-Hiding Approach for IP Telephony Applications with Silence SuppressionSabine S. Schmidt, Wojciech Mazurczyk, Jörg Keller 0001, Luca Caviglione. [doi]
- Anomaly-Based Detection and Classification of Attacks in Cyber-Physical SystemsPhilipp Kreimel, Oliver Eigner, Paul Tavolato. [doi]
- Popularity-based Detection of Domain Generation AlgorithmsJasper Abbink, Christian Doerr. [doi]
- Source Code Patterns of SQL Injection VulnerabilitiesFelix Schuckert, Basel Katt, Hanno Langweg. [doi]
- Lightweight Address Hopping for Defending the IPv6 IoTAljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios G. Voyiatzis, Edgar R. Weippl. [doi]
- Using Ciphers for Failure-Recovery in ITS SystemsMustafa Ayoob, Wael Adi, Vassilis Prevelakis. [doi]
- SensorBuster: On Identifying Sensor Nodes in P2P BotnetsShankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer. [doi]
- Using Markov Chains to Model Sensor Network ReliabilityTom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman, Edward C. Wiebe. [doi]
- bin2llvm: Analysis of Binary Programs Using LLVM Intermediate RepresentationKevin Kirchner, Stefan Rosenthaler. [doi]
- NEXTLEAP: Decentralizing Identity with Privacy for Secure MessagingHarry Halpin. [doi]
- Type Me the Truth!: Detecting Deceitful Users via Keystroke DynamicsMerylin Monaro, Riccardo Spolaor, Qianqian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori. [doi]
- Searchable Encryption with Access ControlNils Löken. [doi]
- Self-healing Multi-Cloud Application ModellingErkuden Rios, Eider Iturbe, Maria Carmen Palacios. [doi]
- A Holistic Approach for Privacy Protection in E-GovernmentKonstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis, Mattia Salnitri, Paolo Giorgini, José F. Ruiz. [doi]
- Go with the -Bitcoin- Flow, with Visual AnalyticsStefano Bistarelli, Francesco Santini. [doi]
- Position Paper: The Past, Present, and Future of Sanitizable and Redactable SignaturesArne Bilzhause, Henrich C. Pöhls, Kai Samelin. [doi]
- Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation ApproachSravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri. [doi]
- A Cloud-Based Compilation and Hardening Platform for Android AppsMarcel Busch, Mykolai Protsenko, Tilo Müller. [doi]
- k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash TablesOlga Kieselmann, Arno Wacker, Gregor Schiele. [doi]
- On the Usefulness of Compression Models for Authorship VerificationOren Halvani, Christian Winter 0001, Lukas Graner. [doi]
- Rolling DICE: Lightweight Remote Attestation for COTS IoT HardwareLukas Jäger, Richard Petri, Andreas Fuchs. [doi]
- SONAR: Automatic Detection of Cyber Security Events over the Twitter StreamQuentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi, Farkhund Iqbal. [doi]
- Machine Learning Approach for Detection of nonTor TrafficElike Hodo, Xavier J. A. Bellekens, Ephraim Iorkyase, Andrew Hamilton, Christos Tachtatzis, Robert C. Atkinson. [doi]
- The Archistar Secret-Sharing Backup ProxyAndreas Happe, Florian Wohner, Thomas Lorünser. [doi]
- On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security AlertsMartin Husák, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda. [doi]
- Quantifying the Spectrum of Denial-of-Service Attacks through Internet BackscatterNorbert Blenn, Vincent Ghiëtte, Christian Doerr. [doi]
- Integrating Reactive Cloud Applications in SERECAChristof Fetzer, Giovanni Mazzeo, John Oliver, Luigi Romano, Martijn Verburg. [doi]
- Protection of personal data in security alert sharing platformsVáclav Stupka, Martin Horák, Martin Husák. [doi]
- Towards a Model of User-centered Privacy PreservationPaul Grace, Mike Surridge. [doi]
- Implementing Secure DevOps assessment for highly regulated environmentsHasan Yasar. [doi]
- Towards Semi-automated Detection of Trigger-based Behavior for Software Security AssuranceDorottya Papp, Levente Buttyán, Zhendong Ma. [doi]
- Continuous Biometric Verification for Non-Repudiation of Remote ServicesEnrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli. [doi]
- Busting a Myth: Review of Agile Security Engineering MethodsKalle Rindell, Sami Hyrynsalmi, Ville Leppänen. [doi]