Abstract is missing.
- Who Is Reusing Stolen Passwords? An Empirical Study on Stolen Passwords and CountermeasuresChedy Missaoui, Safa Bachouch, Ibrahim Abdelkader, Slim Trabelsi. 3-17 [doi]
- A Survey of Keylogger and Screenlogger Attacks in the Banking Sector and Countermeasures to ThemHugo Sbai, Michael Goldsmith, Samy Meftali, Jassim Happa. 18-32 [doi]
- Classification of Malware Families Based on Runtime BehaviourMunir Geden, Jassim Happa. 33-48 [doi]
- Botnet Detection in Software Defined Networks by Deep Learning TechniquesIvan Letteri, Giuseppe Della Penna, Giovanni De Gasperis. 49-62 [doi]
- A Bio-inspired Approach to Attack Graphs AnalysisVincenzo Conti, Simone Sante Ruffo, Alessio Merlo, Mauro Migliardi, Salvatore Vitabile. 63-76 [doi]
- Confidence Curve for Continuous AuthenticationTony Quertier. 77-84 [doi]
- SCADA Security: Concepts and RecommendationsDragos Ionica, Florin Pop, Nirvana Popescu, Decebal Popescu, Ciprian Dobre. 85-98 [doi]
- Towards the Evaluation of End-to-End Resilience Through External ConsistencyThomas Clédel, Simon N. Foley, Nora Cuppens, Frédéric Cuppens, Yvon Kermarrec, Frédéric Dubois, Youssef Laarouchi, Gérard Le Comte. 99-114 [doi]
- Optimal Partitioning of LLC in CAT-enabled CPUs to Prevent Side-Channel AttacksUgo Fiore, Adrian Florea, Arpad Gellert, Lucian Vintan, Paolo Zanetti. 115-123 [doi]
- GER-EN - GNSS Error Reduction Using an Elastic Network Based on V2V and LiDARWalter Balzano, Fabio Vitale. 124-131 [doi]
- A Dynamic Security Policies Generation Model for Access Control in Smart Card Based ApplicationsB. B. Gupta, Megha Quamara. 132-143 [doi]
- An Advanced Methodology to Analyse Data Stored on Mobile DevicesFlora Amato, Giovanni Cozzolino, Antonino Mazzeo, Francesco Moscato 0001. 144-154 [doi]
- On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix CodesPaolo D'Arco, Roberto De Prisco, Alfredo De Santis. 157-167 [doi]
- An Efficient and Reliable Two-Level Lightweight Authentication ProtocolPaolo D'Arco, Roberto De Prisco, Angel L. Pérez del Pozo. 168-180 [doi]
- Selective All-Or-Nothing Transform: Protecting Outsourced Data Against Key ExposureKatarzyna Kapusta, Gérard Memmi. 181-193 [doi]
- Light Blockchain Communication Protocol for Secure Data Transfer IntegrityJakub Guziur, Michal Pawlak, Aneta Poniszewska-Maranda, Bartosz Wieczorek. 194-208 [doi]
- Towards the Blockchain Technology for System Voting ProcessMichal Pawlak, Jakub Guziur, Aneta Poniszewska-Maranda. 209-223 [doi]
- Privacy-Preserving SAT Solving Based on Projection-Equivalence CNF ObfuscationYing Qin, Xiao Yang Shen, Zhen Yue Du. 224-239 [doi]
- A Fragile Watermarking and Bilinear Fuzzy EquationsFerdinando Di Martino, Salvatore Sessa. 240-253 [doi]
- Privacy Preserving Biometric Identification on the Bitcoin BlockchainNeyire Deniz Sarier. 254-269 [doi]
- Iris Quality Assessment: A Statistical Approach for Biometric Security ApplicationsAndrea F. Abate, Silvio Barra, Andrea Casanova, Gianni Fenu, Mirko Marras. 270-278 [doi]
- Enhancing Information Security Culture to Reduce Information Security Cost: A Proposed FrameworkS. G. Govender, Marianne Loock, Elmarie Kritzinger. 281-290 [doi]
- Chatbot: An Education Support System for StudentFabio Clarizia, Francesco Colace, Marco Lombardi, Francesco Pascale, Domenico Santaniello. 291-302 [doi]
- A Multilevel Graph Approach for Road Accidents Data InterpretationFabio Clarizia, Francesco Colace, Marco Lombardi, Francesco Pascale, Domenico Santaniello. 303-316 [doi]
- Cyber Safety Awareness and Culture Planning in South AfricaElmarie Kritzinger, Marianne Loock, E. N. Mwim. 317-326 [doi]