Abstract is missing.
- pQUANT: A User-Centered Privacy Risk Analysis FrameworkWelderufael B. Tesfay, Dimitra Nastouli, Yannis C. Stamatiou, Jetzabel M. Serna. 3-16 [doi]
- An Industrial Trial of an Approach to Identification and Modelling of Cybersecurity Risks in the Context of Digital Secondary SubstationsAida Omerovic, Hanne Vefsnmo, Oddbjørn Gjerde, Siri T. Ravndal, Are Kvinnesland. 17-33 [doi]
- Continuous Risk Management for Industrial IoT: A Methodological ViewCarolina Adaros Boye, Paul Kearney, Mark Josephs. 34-49 [doi]
- Systematic Asset Identification and Modeling During Requirements EngineeringNazila Gol Mohammadi, Roman Wirtz, Maritta Heisel. 50-66 [doi]
- Inference Control in Distributed Environment: A Comparison StudyAdel Jebali 0002, Salma Sassi, Abderrazak Jemai. 69-83 [doi]
- MAPPER: Mapping Application Description to PermissionsRajendra Kumar Solanki, Vijay Laxmi, Manoj Singh Gaur. 84-98 [doi]
- Delegation of Computation Using FV CryptosystemAmina Bel Korchi, Nadia El Mrabet. 101-112 [doi]
- Hardware Optimization on FPGA for the Modular Multiplication in the AMNS RepresentationAsma Chaouch, Fangan-Yssouf Dosso, Laurent-Stéphane Didier, Nadia El Mrabet, Bouraoui Ouni, Belgacem Bouallegue. 113-127 [doi]
- A Semantic Framework with Humans in the Loop for Vulnerability-Assessment in Cyber-Physical Production SystemsYuning Jiang, Yacine Atif, Jianguo Ding, Wei Wang. 128-143 [doi]
- A Complete and Generic Security Approach for Wireless Sensors NetworkImen Bouabidi, Pr. Mahmoud Abdellaoui. 147-163 [doi]
- WPA3 Connection Deprivation AttacksKarim Lounis, Mohammad Zulkernine. 164-176 [doi]
- An Approach for Thwarting Malicious Secret Channel: The Case of IP Record Route Option Header-Based Covert ChannelsFiras Saidi, Zouheir Trabelsi, Henda Ben Ghezela. 177-192 [doi]
- Toward Ciphertext Policy Attribute Based Encryption Model: A Revocable Access Control Solution in Cloud ComputingMariem Bouchaala, Cherif Ghazel, Leïla Azouz Saïdane. 193-207 [doi]
- A Framework for GDPR Compliance in Big Data SystemsMouna Rhahla, Sahar Allegue, Takoua Abdellatif. 211-226 [doi]
- I do it because they do it": Social-Neutralisation in Information Security Practices of Saudi Medical InternsSaad Altamimi, Karen Renoud, Timothy Storer. 227-243 [doi]
- Unsupervised Machine Learning for Card Payment Fraud DetectionMario Parreño Centeno, Mohammed Aamir Ali, Yu Guan, Aad van Moorsel. 247-262 [doi]
- Intrusion Detection Study and Enhancement Using Machine LearningHela Mliki, Abir Hadj Kaceam, Lamia Chaari. 263-278 [doi]
- Watch Out! Doxware on the Way..Routa Moussaileb, Charles Berti, Guillaume Deboisdeffre, Nora Cuppens, Jean-Louis Lanet. 279-292 [doi]
- CDISS-BEMOS: A New Color Document Image Steganography System Based on Beta Elliptic Modeling of the Online SignatureAnissa Zenati, Wael Ouarda, Adel M. Alimi. 293-307 [doi]
- A Graph Based Model for UAVs Group-Wide Collaboration Applied on an Anti-terrorism ScenarioAmal Gassara, Ismael Bouassida Rodriguez. 311-324 [doi]
- Modelling and Executing Time-Aware Processes in Trustless Blockchain EnvironmentAmal Abid 0002, Saoussen Cheikhrouhou, Mohamed Jmaiel. 325-341 [doi]
- Multi-scale Adaptive Threshold for DDoS DetectionFatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari, Claude Fachkha. 342-354 [doi]
- A Recommender System for User-Specific Vulnerability ScoringLinus Karlsson, Pegah Nikbakht Bideh, Martin Hell. 355-364 [doi]
- Distributed Detection System Using Wavelet Decomposition and Chi-Square TestFatima Ezzahra Ouerfelli, Khaled Barbaria, Belhassen Zouari, Claude Fachkha. 365-377 [doi]