Abstract is missing.
- Detecting Anomalies in Printed Intelligence Factory NetworkMatti Mantere, Mirko Sailio, Sami Noponen. 1-16 [doi]
- Context-Awareness Using Anomaly-Based Detectors for Smart Grid DomainsCristina Alcaraz, Lorena Cazorla, Gerardo Fernandez. 17-34 [doi]
- Automated Detection of Logical Errors in ProgramsGeorge Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis. 35-51 [doi]
- Evaluation of Dynamic Instantiation in CPRM-Based SystemsAna Nieto. 52-66 [doi]
- Privacy Issues in Geosocial NetworksZakaria Sahnoune, Cheu Yien Yep, Esma Aïmeur. 67-82 [doi]
- SocialSpy: Browsing (Supposedly) Hidden Information in Online Social NetworksAndrea Burattin, Giuseppe Cascavilla, Mauro Conti. 83-99 [doi]
- Latent Semantic Analysis for Privacy Preserving Peer FeedbackMouna Selmi, Hicham Hage, Esma Aïmeur. 100-115 [doi]
- Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic AlgorithmsAlexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul. 116-130 [doi]
- Location-Aware RBAC Based on Spatial Feature Models and Realistic PositioningPhilipp Marcus, Lorenz Schauer, Claudia Linnhoff-Popien. 131-147 [doi]
- Inter-technology Conflict Analysis for Communication Protection PoliciesCataldo Basile, Daniele Canavese, Antonio Lioy, Fulvio Valenza. 148-163 [doi]
- Two-Level Automated Approach for Defending Against Obfuscated Zero-Day AttacksRatinder Kaur, Maninder Singh. 164-179 [doi]
- Practical Attacks on Virtual WorldsGraham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis. 180-195 [doi]
- TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing AttacksHana Fahim-Hashemi, Mohammad Zulkernine, Komminist Weldemariam. 196-212 [doi]
- Towards a Full Support of Obligations in XACMLDonia El Kateb, Yehia Elrakaiby, Tejeddine Mouelhi, Iram Rubab, Yves Le Traon. 213-221 [doi]
- Managing Heterogeneous Access Control Models Cross-OrganizationSamira Haguouche, Zahi Jarir. 222-229 [doi]
- ISER: A Platform for Security Interoperability of Multi-source SystemsKhalifa Toumi, Fabien Autrel, Ana R. Cavalli, Sammy Haddad. 230-238 [doi]
- Key Extraction Attack Using Statistical Analysis of Memory Dump DataYuto Nakano, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake. 239-246 [doi]
- How Robust is the Internet? - Insights from Graph AnalysisAnnika Baumann, Benjamin Fabian. 247-254 [doi]
- Regularity Based Decentralized Social NetworksZhe Wang, Naftaly H. Minsky. 255-262 [doi]
- Online Privacy: Risks, Challenges, and New TrendsEsma Aïmeur. 263-266 [doi]
- Data AnonymizationJosep Domingo-Ferrer, Jordi Soria-Comas. 267-271 [doi]
- Security of the Android Operating SystemYury Zhauniarovich. 272-274 [doi]