Abstract is missing.
- MalProfiler: Automatic and Effective Classification of Android Malicious Apps in Behavioral ClassesAntonio La Marra, Fabio Martinelli, Andrea Saracino, Mina Sheikhalishahi. 3-19 [doi]
- Andrana: Quick and Accurate Malware Detection for AndroidAndrew Bedford, Sébastien Garvin, Josée Desharnais, Nadia Tawbi, Hana Ajakan, Frédéric Audet, Bernard Lebel. 20-35 [doi]
- Micro-signatures: The Effectiveness of Known Bad N-Grams for Network Anomaly DetectionRichard E. Harang, Peter Mell. 36-47 [doi]
- Multi-Criteria Recommender Approach for Supporting Intrusion Response SystemTarek Bouyahia, Nora Cuppens-Boulahia, Frédéric Cuppens, Fabien Autrel. 51-67 [doi]
- An Optimal Metric-Aware Response Selection Strategy for Intrusion Response SystemsNadine Herold, Matthias Wachs, Stephan-Alexander Posselt, Georg Carle. 68-84 [doi]
- Attack Mitigation by Data Structure RandomizationZhongtian Chen, Hao Han. 85-93 [doi]
- Vulnerability Analysis of Software Defined NetworkingSalaheddine Zerkane, David Espes, Philippe Le Parc, Frédéric Cuppens. 97-116 [doi]
- Towards Metric-Driven, Application-Specific Visualization of Attack GraphsMickael Emirkanian-Bouchard, Lingyu Wang. 117-134 [doi]
- Insider Threat Likelihood Assessment for Access Control Systems: Quantitative ApproachSofiene Boulares, Kamel Adi, Luigi Logrippo. 135-142 [doi]
- An Enhancement of Privacy-Preserving Wildcards Pattern MatchingTushar Kanti Saha, Takeshi Koshiba. 145-160 [doi]
- Privacy-Aware Data Sharing in a Tree-Based Categorical Clustering AlgorithmMina Sheikhalishahi, Mohamed Mejri, Nadia Tawbi, Fabio Martinelli. 161-178 [doi]
- Three Views of Log Trace TriagingRaphaël Khoury, Sébastien Gaboury, Sylvain Hallé. 179-195 [doi]
- A Multi-round Side Channel Attack on AES Using Belief PropagationHélène Le Bouder, Ronan Lashermes, Yanis Linge, Gaël Thomas 0002, Jean-Yves Zie. 199-213 [doi]
- Anonymizable Ring Signature Without PairingOlivier Blazy, Xavier Bultel, Pascal Lafourcade 0001. 214-222 [doi]
- Security Analysis of WirelessHART Communication SchemeLyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens. 223-238 [doi]
- Function Classification for the Retro-Engineering of MalwaresGuillaume Bonfante, Julien Oury Nogues. 241-255 [doi]
- On the Feasibility of Malware Authorship AttributionSaed Alrabaee, Paria Shirani, Mourad Debbabi, Lingyu Wang. 256-272 [doi]
- Semantically Non-preserving Transformations for Antivirus EvaluationErkan Ersan, Lior Malka, Bruce M. Kapron. 273-281 [doi]
- A Self-correcting Information Flow Control Model for the Web-BrowserDeepak Subramanian, Guillaume Hiet, Christophe Bidan. 285-301 [doi]
- Threat Modeling for Cloud Data Center InfrastructuresNawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal. 302-319 [doi]
- Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC)Daniel Servos, Sylvia L. Osborn. 320-328 [doi]
- Patrolling Trees with Mobile RobotsJurek Czyzowicz, Adrian Kosowski, Evangelos Kranakis, Najmeh Taleb. 331-344 [doi]
- Towards Side-Channel Secure Firmware Updates - A Minimalist Anomaly Detection ApproachOscar M. Guillen, Fabrizio De Santis, Ralf Brederlow, Georg Sigl. 345-360 [doi]