Abstract is missing.
- Investigating the dark cyberspace: Profiling, threat-based analysis and correlationClaude Fachkha, Elias Bou-Harb, Amine Boukhtouta, Son Dinh, Farkhund Iqbal, Mourad Debbabi. 1-8 [doi]
- Semiring-based constraint models and frameworks for security-related scenariosStefano Bistarelli, Francesco Santini. 1-4 [doi]
- Don't work. Can't work? Why it's time to rethink security warningsKat Krol, Matthew Moroz, Martina Angela Sasse. 1-8 [doi]
- Privacy-by-design based on quantitative threat modelingJesus Luna Garcia, Neeraj Suri, Ioannis Krontiris. 1-8 [doi]
- Towards efficient access control in a mobile agent based wireless sensor networkEstanislao Mercadal, Guillermo Navarro-Arribas, Simon N. Foley, Joan Borrell. 1-4 [doi]
- Semantic matching of web services security policiesMonia Ben Brahim, Tarak Chaari, Maher Ben Jemaa, Mohamed Jmaiel. 1-8 [doi]
- Security-related vulnerability life cycle analysisGeraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche. 1-8 [doi]
- Browser function calls modeling for banking malware detectionManuel García-Cervigón, Manel Medina Llinas. 1-7 [doi]
- CRiSIS 2012 security standards tutorialStephen Farrell. 1-4 [doi]
- Anomaly analysis for Physical Access Control security configurationWilliam M. Fitzgerald, Fatih Turkmen, Simon N. Foley, Barry O'Sullivan. 1-8 [doi]
- Detecting attacks against data in web applicationsRomaric Ludinard, Eric Totel, Frederic Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy. 1-8 [doi]
- Improving the detection of on-line vertical port scan in IP trafficYousra Chabchoub, Christine Fricker, Philippe Robert. 1-6 [doi]
- Hash pile ups: Using collisions to identify unknown hash functionsR. Joshua Tobin, David Malone. 1-6 [doi]
- Trust-based delegation for Ad Hoc QoS enhancingRyma Abassi, Sihem Guemara El Fatmi. 1-7 [doi]
- Evasion-resistant malware signature based on profiling kernel data structure objectsAhmed F. Shosha, Chen-Ching Liu, Pavel Gladyshev, Marcus Matten. 1-8 [doi]
- Managing and accessing data in the cloud: Privacy risks and approachesSabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati. 1-9 [doi]
- A honeypot for arbitrary malware on USB storage devicesSebastian Poeplau, Jan Gassen. 1-8 [doi]
- Partitioning the InternetMatthias Wachs, Christian Grothoff, Ramakrishna Thurimella. 1-8 [doi]
- Attacks against smart cards: Hands on sessionJean-Louis Lanet. 1-5 [doi]
- A vector based model approach for defining trust in Multi-Organization EnvironmentsKhalifa Toumi, César Andrés, Ana R. Cavalli, Mazen El Maarabani. 1-8 [doi]
- Distributed e-voting using the Smart Card Web ServerLazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Song Dong, Konstantinos Markantonakis. 1-8 [doi]
- Modeling the Stuxnet attack with BDMP: Towards more formal risk assessmentsSiwar Kriaa, Marc Bouissou, Ludovic Pietre-Cambacedes. 1-8 [doi]