Abstract is missing.
- Cyber-Security for the Controller Area Network (CAN) Communication ProtocolChung-Wei Lin, Alberto L. Sangiovanni-Vincentelli. 1-7 [doi]
- A Routing Table Insertion (RTI) Attack on FreenetTodd Baumeister, Yingfei Dong, Zhenhai Duan, Guanyu Tian. 8-15 [doi]
- Crucial Nodes Centric Visual Monitoring and Analysis of Computer NetworksHanchen Song, Chris Muelder, Kwan-Liu Ma. 16-23 [doi]
- CTrust: A Framework for Secure and Trustworthy Application Execution in Cloud ComputingSatyajeet Nimgaonkar, Srujan Kotikela, Mahadevan Gomathisankaran. 24-31 [doi]
- A Sender-Centric Approach to Detecting Phishing EmailsFernando Sanchez, Zhenhai Duan. 32-39 [doi]
- A Contextual Anomaly Detection Approach to Discover Zero-Day AttacksAhmed AlEroud, George Karabatis. 40-45 [doi]
- WAVES: Automatic Synthesis of Client-Side Validation Code for Web ApplicationsNazari Skrupsky, Maliheh Monshizadeh, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck. 46-53 [doi]
- Systems for Detecting Advanced Persistent Threats: A Development Roadmap Using Intelligent Data AnalysisJohannes de Vries, Hans Hoogstraaten, Jan van den Berg, Semir Daskapan. 54-61 [doi]
- Crime Pays If You Are Just an Average HackerWoohyun Shim, Luca Allodi, Fabio Massacci. 62-68 [doi]
- A Context-Based Detection Framework for Advanced Persistent ThreatsPaul Giura, Wei Wang. 69-74 [doi]
- I Have the Proof: Providing Proofs of Past Data Possession in Cloud ForensicsShams Zawoad, Ragib Hasan. 75-82 [doi]
- Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference ModelJun Dai, Xiaoyan Sun, Peng Liu, Nicklaus A. Giacobe. 83-92 [doi]
- A Cyber-Security Storm MAPDenise Ferebee, Dipankar Dasgupta, Qishi Wu. 93-102 [doi]
- Cyber Crisis Management: A Decision-Support Framework for Disclosing Security Incident InformationOlga Kulikova, Ronald Heil, Jan van den Berg, Wolter Pieters. 103-112 [doi]
- Fault Tree Analysis of Accidental Insider Security EventsPallavi Patil, Pavol Zavarsky, Dale Lindskog, Ron Ruhl. 113-118 [doi]
- Cyber - Transparencies, Assurance and DeterrenceSimon Reay Atkinson, David Walker, Kevin Beaulne, Liaquat Hossain. 119-126 [doi]
- Security and Integrity Analysis Using IndicatorsSharif Hassan, Ratan Guha. 127-135 [doi]
- Leveraging an Inventory of the Cognitive Radio Attack SurfaceAndre Abadie, Duminda Wijesekera. 136-143 [doi]
- A Generic Approach to Critical Infrastructure Modeling and SimulationMarlies Rybnicek, Rainer Poisel, Manfred Ruzicka, Simon Tjoa. 144-151 [doi]
- Principal Causes of Information Communication Technology (ICT) Risk Failure in an SMEAnass Bayaga, Stephen Flowerday. 152-156 [doi]
- Is IPv6 Ready for the Smart Grid?Tanja Zseby. 157-164 [doi]
- An Adaptive Honeypot System to Capture IPv6 Address ScansKazuya Kishimoto, Kenji Ohira, Yukiko Yamaguchi, Hirofumi Yamaki, Hiroki Takakura. 165-172 [doi]
- Exploring Covert Channel in Android PlatformWade Gasior, Li Yang. 173-177 [doi]
- A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked CommunityMunene W. Kanampiu, Justin Zhan. 178-186 [doi]
- Extending Case-Based Reasoning to Network Alert ReportingRobert F. Erbacher, Steve E. Hutchinson. 187-194 [doi]
- A Compose Language-Based Framework for Secure Service CompositionBo Zhou, David Llewellyn-Jones, Qi Shi, Muhammad Asim, Madjid Merabti, David J. Lamb. 195-202 [doi]
- Permanent Revocation in Attribute Based Broadcast EncryptionShlomi Dolev, Niv Gilboa, Marina Kopeetsky. 203-208 [doi]
- Towards Defeating DDoS AttacksAlex Doyal, Justin Zhan, Huiming Anna Yu. 209-212 [doi]