Abstract is missing.
- YALIH, Yet Another Low Interaction HoneyclientMasood Mansoori, Ian Welch, Qiang Fu. 7-15 [doi]
- Poisoned GOOSE: Exploiting the GOOSE ProtocolNishchal Kush, Ejaz Ahmed, Mark Branagan, Ernest Foo. 17-22 [doi]
- Weak key-IV Pairs in the A5/1 Stream CipherAli Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong. 23-36 [doi]
- Formalising Human Recognition: a Fundamental Building Block for Security ProofsKenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila. 37-45 [doi]
- An Authorised Pseudonym System for Privacy Preserving Location Proof ArchitecturesJanaka Seneviratne, Udaya Parampalli, Lars Kulik. 47-56 [doi]
- Practical Modbus Flooding Attack and DetectionSajal Bhatia, Nishchal Kush, Chris I. Djamaludin, Ayodeji J. Akande, Ernest Foo. 57-65 [doi]
- A Case Study of User-Level Spam FilteringKamini Bajaj, Josef Pieprzyk. 67-75 [doi]
- Algebraic analysis of Trivium-like ciphers (Poster)Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson. 77-81 [doi]
- Hypervisor-based Security Architecture for Validating DNS Services (Poster)Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan. 83-86 [doi]