Abstract is missing.
- Security Analysis of Key Acquiring Strategies Used by Cryptographic RansomwareZiya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan. [doi]
- Towards unambiguous IT risk definitionMaksim Goman. [doi]
- It's all fun and games, and some legalese: data protection implications for increasing cyber-skills of employees through gamesDanaja Fabcic Povse. [doi]
- Aligning Business Process Access Control Policies with Enterprise ArchitectureRoman Pilipchuk, Stephan Seifermann, Robert Heinrich. [doi]
- An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information SecurityMelisa Geko, Simon Tjoa. [doi]
- OpenSPA - An Open and Extensible Protocol for Single Packet AuthorizationGregor R. Krmelj, Matjaz Pancur, Miha Grohar, Mojca Ciglaric. [doi]
- A brief look at the security of DeviceNet communication in industrial control systemsPal-Stefan Murvay, Bogdan Groza. [doi]
- Structural Limitations of B+-Tree forensicsPeter Kieseberg, Sebastian Schrittwieser, Edgar R. Weippl. [doi]
- Application Detection in Anonymous Communication NetworksMohammad Hajian Berenjestanaki, Mohammadali Akhaee. [doi]
- Virtual honeypots and detection of telnet botnetsTomás Bajtos, Pavol Sokol, Terézia Mézesová. [doi]
- What drives the motivation to self-protect on social networks?: The role of privacy concerns and perceived threatsDamjan Fujs, Simon L. R. Vrhovec, Anze Mihelic. [doi]
- Improving Lawful Interception in Virtual DatacentersDaniel Spiekermann, Jörg Keller 0001, Tobias Eggendorfer. [doi]
- Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud EnvironmentsDaniel Fraunholz, Daniel Schneider, Janis Zemitis, Hans Dieter Schotten. [doi]
- Coping with Access Control Requirements in the Context of Mutual Dependencies between Business and ITRoman Pilipchuk. [doi]
- A Testbed for Performing Security Experiments with Software-Defined Industrial Control SystemsZoltán Szántó, Hunor Sándor, Béla Genge. [doi]
- Do ut des: Disseminating online child sexual abuse material for investigative purposes?Sabine K. Witting. [doi]
- One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert ChannelsSteffen Wendzel, Daniela Eller, Wojciech Mazurczyk. [doi]
- Privacy improvement model for biometric person recognition in ambient intelligence using perceptual hashingPetra Grd, Igor Tomicic, Miroslav Baca. [doi]
- A Framework for a Forensically Sound Harvesting the Dark WebOliver Popov, Jesper Bergman, Christian Valassi. [doi]