Abstract is missing.
- Uniqueness of the file systems genome: Supporting arguments and massive experimental measurementsRoberto Di Pietro, Luigi V. Mancini, Antonio Villani, Domenico Vitali. 1-8 [doi]
- Privacy-enhanced filtering and collection middleware in EPCglobal networksWiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro. 1-8 [doi]
- A complete tableau procedure for risk analysisMatteo Cristani, Erisa Karafili, Luca Viganò. 1-8 [doi]
- Accessing secure information using export file fraudulenceGuillaume Bouffard, Tom Khefif, Jean-Louis Lanet, Ismael Kane, Sergio Casanova Salvia. 1-5 [doi]
- A defensive Java Card virtual machine to thwart fault attacks by microarchitectural supportMichael Lackner, Reinhard Berlach, Michael Hraschan, Reinhold Weiss, Christian Steger. 1-8 [doi]
- Detection of attack strategiesSuliman A. Alsuhibany, Charles Morisset, Aad P. A. van Moorsel. 1-8 [doi]
- Selective record route DoS tracebackMohammed Alenezi, Martin J. Reed. 1-7 [doi]
- What security for electronic exams?Rosario Giustolisi, Gabriele Lenzini, Giampaolo Bella. 1-5 [doi]
- A formal methodology for Enterprise Information Security risk assessmentJaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar. 1-9 [doi]
- How to develop secure applications with Aspect-Oriented ProgrammingMónica Pinto, Jose Miguel Horcas. 1-3 [doi]
- An event processing approach for threats monitoring of service compositionsDhouha Ayed, Muhammad Asim, David Llewellyn-Jones. 1-10 [doi]
- Misbehaviour monitoring on system-of-systems componentsNathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat. 1-6 [doi]
- Economic impact of software security activities in software developmentGolriz Chehrazi. 1-4 [doi]
- CREPUSCOLO: A collusion resistant privacy preserving location verification systemEyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro. 1-9 [doi]
- Semantic-based context-aware alert fusion for distributed Intrusion Detection SystemsAlireza Sadighian, Saman Taghavi Zargar, Jose M. Fernandez, Antoine Lemay. 1-6 [doi]
- Quantitative assessment of software vulnerabilities based on economic-driven security metricsHamza Ghani, Jesus Luna, Neeraj Suri. 1-8 [doi]
- Predictive vulnerability scoring in the context of insufficient information availabilityHamza Ghani, Jesus Luna, Abdelmajid Khelil, Najib Alkadri, Neeraj Suri. 1-8 [doi]
- Parsifal: Writing efficient and robust binary parsers, quicklyOlivier Levillain, Hervé Debar, Benjamin Morin. 1-6 [doi]
- MASS: An efficient and secure broadcast authentication scheme for resource constrained devicesWafa Ben Jaballah, Mauro Conti, Roberto Di Pietro, Mohamed Mosbah, Nino Vincenzo Verde. 1-6 [doi]
- ForewordJean-Louis Lanet. 1 [doi]
- Controlled information sharing for unspecified emergenciesBarbara Carminati, Elena Ferrari, Michele Guglielmi. 1-8 [doi]