Abstract is missing.
- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV)Nawaf Alhebaishi, Lingyu Wang 0001, Sushil Jajodia. 3-23 [doi]
- Managing Secure Inter-slice Communication in 5G Network Slice ChainsLuis A. Suárez, David Espes, Frédéric Cuppens, Cao-Thanh Phan, Philippe Bertin, Philippe Le Parc. 24-41 [doi]
- Proactively Extracting IoT Device Capabilities: An Application to Smart HomesAndy Dolan, Indrakshi Ray, Suryadipta Majumdar. 42-63 [doi]
- Security Enumerations for Cyber-Physical SystemsDaniel Schlette, Florian Menges, Thomas Baumer, Günther Pernul. 64-76 [doi]
- Inference-Proof Monotonic Query Evaluation and View Generation ReconsideredJoachim Biskup. 79-99 [doi]
- Network Functions Virtualization Access Control as a ServiceManel Smine, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens. 100-117 [doi]
- Effective Access Control in Shared-Operator Multi-tenant Data Stream Management SystemsMarian Zaki, Adam J. Lee, Panos K. Chrysanthis. 118-136 [doi]
- Information Flow Security Certification for SPARK ProgramsSandip Ghosal, R. K. Shyamasundar. 137-150 [doi]
- Provably Privacy-Preserving Distributed Data Aggregation in Smart GridsMarius Stübs, Tobias Mueller, Kai Bavendiek, Manuel Loesch, Sibylle Schupp, Hannes Federrath. 153-173 [doi]
- Non-interactive Private Decision Tree EvaluationAnselme Tueno, Yordan Boev, Florian Kerschbaum. 174-194 [doi]
- Privacy-Preserving Anomaly Detection Using Synthetic DataRudolf Mayer, Markus Hittmeir, Andreas Ekelhart. 195-207 [doi]
- Local Differentially Private Matrix Factorization with MoG for RecommendationsNeera Jeyamohan, Xiaomin Chen, Nauman Aslam, Zhan Shu. 208-220 [doi]
- Designing a Decision-Support Visualization for Live Digital Forensic InvestigationsFabian Böhm, Ludwig Englbrecht, Günther Pernul. 223-240 [doi]
- Predictive Analytics to Prevent Voice over IP International Revenue Sharing FraudYoram J. Meijaard, Bram C. M. Cappers, Josh G. M. Mengerink, Nicola Zannone. 241-260 [doi]
- PUA Detection Based on Bundle Installer CharacteristicsAmir Lukach, Ehud Gudes, Asaf Shabtai. 261-273 [doi]
- ML-Supported Identification and Prioritization of Threats in the OVVL Threat Modelling ToolAndreas Schaad, Dominik Binder. 274-285 [doi]
- Enhancing the Performance of Spatial Queries on Encrypted Data Through Graph EmbeddingSina Shaham, Gabriel Ghinita, Cyrus Shahabi. 289-309 [doi]
- Crowdsourcing Under Data Poisoning Attacks: A Comparative StudyFarnaz Tahmasebian, Li Xiong 0001, Mani Sotoodeh, Vaidy S. Sunderam. 310-332 [doi]
- Self-enhancing GPS-Based Authentication Using Corresponding AddressTran Phuong Thao, Mhd Irvan, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi, Toshiyuki Nakata 0001. 333-344 [doi]
- GOOSE: A Secure Framework for Graph Outsourcing and SPARQL EvaluationRadu Ciucanu, Pascal Lafourcade 0001. 347-366 [doi]
- SGX-IR: Secure Information Retrieval with Trusted ProcessorsFahad Shaon, Murat Kantarcioglu. 367-387 [doi]
- Readability of Privacy PoliciesBarbara Krumay, Jennifer Klar. 388-399 [doi]