Abstract is missing.
- Automatic Vulnerability Classification Using Machine LearningMarian Gawron, Feng Cheng 0002, Christoph Meinel. 3-17 [doi]
- A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management SystemsMuhammad Imran Khan, Barry O'Sullivan, Simon N. Foley. 18-28 [doi]
- Towards a Security Event Data TaxonomyGustavo Gonzalez Granadillo, José Rubio-Hernán, Joaquín García-Alfaro. 29-45 [doi]
- Unraveling Reflection Induced Sensitive Leaks in Android AppsJyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Daya Ram Sharma, Akka Zemmari, Mohamed Mosbah, Mauro Conti. 49-65 [doi]
- Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future DirectionsAlessio Viticchié, Cataldo Basile, Antonio Lioy. 66-82 [doi]
- Using Data Integration to Help Design More Secure ApplicationsSébastien Salva, Loukmen Regainia. 83-98 [doi]
- MA-MOrBAC: A Distributed Access Control Model Based on Mobile Agent for Multi-organizational, Collaborative and Heterogeneous SystemsZeineb Ben Yahya, Farah Barika Ktata, Khaled Ghédira. 101-114 [doi]
- A Vehicle Collision-Warning System Based on Multipeer Connectivity and Off-the-Shelf Smart-DevicesBogdan Groza, Cosmin Briceag. 115-123 [doi]
- Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud ApplicationsKhalil Hariss, Hassan Noura, Abed Ellatif Samhat, Maroun Chamoun. 127-139 [doi]
- A Study of Threat Detection Systems and Techniques in the CloudPamela Carvallo, Ana R. Cavalli, Natalia Kushik. 140-155 [doi]
- Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance MarketFabio Martinelli, Albina Orlando, Ganbayar Uuganbayar, Artsiom Yautsiukhin. 159-174 [doi]
- Towards an Anonymity Supported Platform for Shared Cyber Threat IntelligenceThomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah. 175-183 [doi]
- Phishing Attacks Root CausesHossein Abroshan, Jan Devos, Geert Poels, Eric Laermans. 187-202 [doi]
- Domain Name System Without Root ServersMatthäus Wander, Christopher Boelmann, Torben Weis. 203-216 [doi]
- Data Hiding on Social Media Communications Using Text SteganographyHung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang, Chin-Laung Lei. 217-224 [doi]
- Privacy Scoring of Social Network User Profiles Through Risk AnalysisSourya Joyee De, Abdessamad Imine. 227-243 [doi]
- A Method for Developing Qualitative Security Risk Assessment AlgorithmsGencer Erdogan, Atle Refsdal. 244-259 [doi]
- An Empirical Analysis of Risk Aversion in Malware InfectionsJude Jacob Nsiempba, Fanny Lalonde Lévesque, Nathalie De Marcellis-Warin, José M. Fernandez. 260-267 [doi]