Abstract is missing.
- Study on information security and e-Trust in Spanish householdsPablo Perez San-José, Susana de la Fuente Rodriguez. 1-6 [doi]
- Reflections on the engineering and operation of a large-scale embedded device vulnerability scannerAng Cui, Salvatore J. Stolfo. 8-18 [doi]
- Blueprints of a lightweight automated experimentation system: a building block towards experimental cyber securityFrédéric Massicotte, Mathieu Couture. 19-28 [doi]
- Statistical analysis of honeypot data and building of Kyoto 2006+ dataset for NIDS evaluationJungsuk Song, Hiroki Takakura, Yasuo Okabe, Masashi Eto, Daisuke Inoue, Koji Nakao. 29-36 [doi]
- nicter: a large-scale network incident analysis system: case studies for understanding threat landscapeMasashi Eto, Daisuke Inoue, Jungsuk Song, Junji Nakazato, Kazuhiro Ohtaka, Koji Nakao. 37-45 [doi]
- HARMUR: storing and analyzing historic data on malicious domainsCorrado Leita, Marco Cova. 46-53 [doi]
- Adversaries' Holy Grail: access control analyticsIan Molloy, Jorge Lobo 0001, Suresh Chari. 54-61 [doi]
- On collection of large-scale multi-purpose datasets on internet backbone linksFarnaz Moradi, Magnus Almgren, Wolfgang John, Tomas Olovsson, Philippas Tsigas. 62-69 [doi]
- An experimental study on the measurement of data sensitivityYoungja Park, Stephen C. Gates, Wilfried Teiken, Pau-Chen Cheng. 70-77 [doi]
- Sandnet: network traffic analysis of malicious softwareChristian Rossow, Christian J. Dietrich, Herbert Bos, Lorenzo Cavallaro, Maarten van Steen, Felix C. Freiling, Norbert Pohlmann. 78-88 [doi]
- Toward a standard benchmark for computer security research: the worldwide intelligence network environment (WINE)Tudor Dumitras, Darren Shou. 89-96 [doi]
- Legal issues associated with data collection & sharingJody R. Westby. 97-102 [doi]
- An architectural solution for data exchange in cooperative network security researchBrian Trammell, Jan Seedorf, Giuseppe Bianchi 0001. 103-104 [doi]
- PREDICT: a trusted framework for sharing data for cyber security researchCharlotte Scheper, Susanna Cantor, Douglas Maughan. 105-106 [doi]
- A social-engineering-centric data collection initiative to study phishingFederico Maggi, Alessandro Sisto, Stefano Zanero. 107-108 [doi]