Abstract is missing.
- An Empirical Study on the Comprehensibility of Graphical Security Risk Models Based on Sequence DiagramsVetle Volden-Freberg, Gencer Erdogan. 1-17 [doi]
- Are Third-Party Libraries Secure? A Software Library Checker for JavaFabien Patrick Viertel, Fabian Kortum, Leif Wagner, Kurt Schneider. 18-34 [doi]
- A Prediction-Based Method for False Data Injection Attacks Detection in Industrial Control SystemsLyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens. 35-40 [doi]
- Outsourcing Signatures of Confidential DocumentsHervé Chabanne, Julien Keuffer, Emmanuel Prouff. 41-47 [doi]
- Trust Evaluation Model for Attack Detection in Social Internet of ThingsWafa Abdelghani, Corinne Amel Zayani, Ikram Amous, Florence Sèdes. 48-64 [doi]
- A Certificate-Less Key Exchange Protocol for IoTIvan Marco Lobe Kome, Nora Cuppens-Boulahia, Frédéric Cuppens, Vincent Frey. 65-79 [doi]
- Personalized, Browser-Based Visual Phishing Detection Based on Deep LearningAlberto Bartoli, Andrea De Lorenzo, Eric Medvet, Fabiano Tarlao. 80-85 [doi]
- Privacy Preserving Data Offloading Based on TransformationShweta Saharan, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari. 86-92 [doi]
- DSTC: DNS-Based Strict TLS ConfigurationsEman Salem Alashwali, Pawel Szalachowski. 93-109 [doi]
- Authenticated Quality of Service Aware Routing in Software Defined NetworksSamet Aytaç, Orhan Ermis, Mehmet Ufuk Çaglayan, Fatih Alagöz. 110-127 [doi]
- On Consent in Online Social Networks: Privacy Impacts and Research Directions (Short Paper)Sourya Joyee De, Abdessamad Imine. 128-135 [doi]
- Enhancing Collaboration Between Security Analysts in Security Operations CentersDamien Crémilleux, Christophe Bidan, Frédéric Majorczyk, Nicolas Prigent. 136-142 [doi]
- RIICS: Risk Based IICS Segmentation MethodKhaoula Es-Salhi, David Espes, Nora Cuppens. 143-157 [doi]
- Effectiveness and Impact Measurements of a Diversification Based Moving Target DefenseManel Smine, Nora Cuppens, Frédéric Cuppens. 158-171 [doi]
- Practical Security Exploits of the FlexRay In-Vehicle Communication ProtocolPal-Stefan Murvay, Bogdan Groza. 172-187 [doi]
- Connection Dumping Vulnerability Affecting Bluetooth AvailabilityKarim Lounis, Mohammad Zulkernine. 188-204 [doi]
- A Systematic Method to Describe and Identify Security Threats Based on Functional RequirementsRoman Wirtz, Maritta Heisel. 205-221 [doi]
- Optimal Distribution of Privacy Budget in Differential PrivacyAnis Bkakria, Aimilia Tasidou, Nora Cuppens-Boulahia, Frédéric Cuppens, Fatma Bouattour, Feten Ben Fredj. 222-236 [doi]