Abstract is missing.
- Hacking the Security Industry for Fun and Profit and HumanityDavid Jacoby. 5
- Sustainable Security - an Internet of Durable GoodsRoss Anderson. 7
- Big Brother is Smart Watching You - Privacy Concerns about Health and Fitness ApplicationsChristoph Stach. 13-23 [doi]
- Incoming Call Implicit User Authentication - User Authentication via Hand Movement PatternAleksandr Eremin, Konstantin Kogos. 24-29 [doi]
- ACCESSORS - A Data-Centric Permission Model for the Internet of ThingsChristoph Stach, Bernhard Mitschang. 30-40 [doi]
- How to Break CaptchaStarThomas Gougeon, Patrick Lacharme. 41-51 [doi]
- Knock-Knock: The Unbearable Lightness of Android NotificationsConstantinos Patsakis, Efthimios Alepis. 52-61 [doi]
- Spectral Analysis of Keystroke Streams: Towards Effective Real-time Continuous User AuthenticationAbdullah Alshehri, Frans Coenen, Danushka Bollegala. 62-73 [doi]
- Identifying Needs for a Holistic Modelling Approach to Privacy Aspects in Enterprise Software SystemsSascha Alpers, Roman Pilipchuk, Andreas Oberweis, Ralf H. Reussner. 74-82 [doi]
- A Security Analysis, and a Fix, of a Code-Corrupted Honeywords SystemZiya Alper Genç, Gabriele Lenzini, Peter Y. A. Ryan, Itzel Vázquez Sandoval. 83-95 [doi]
- BroncoVote: Secure Voting System using Ethereum's BlockchainGaby G. Dagher, Praneeth Babu Marella, Matea Milojkovic, Jordan Mohler. 96-107 [doi]
- Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic CharacterizationIman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani. 108-116 [doi]
- VisABAC: A Tool for Visualising ABAC PoliciesCharles Morisset, David Sanchez. 117-126 [doi]
- A Comparative Analysis of Current CryptocurrenciesLara Mauri, Stelvio Cimato, Ernesto Damiani. 127-138 [doi]
- Inferring Smartphone Users' Handwritten Patterns by using Motion SensorsWei-Han Lee, Jorge Ortiz, Bongjun Ko, Ruby B. Lee. 139-148 [doi]
- On App-based Matrix Code Authentication in Online BankingVincent Haupert, Tilo Müller. 149-160 [doi]
- Relational Database Anonymization - A Model-driven Guiding ApproachFeten Ben Fredj, Nadira Lammari, Isabelle Comyn-Wattiau. 161-170 [doi]
- Privacy Compliant Multi-biometric Authentication on SmartphonesAlexandre Ninassi, Sylvain Vernois, Christophe Rosenberger. 173-181 [doi]
- Automated Detection of the Early Stages of Cyber Kill ChainIan Herwono, Fadi Ali El-Moussa. 182-189 [doi]
- The Rapid Extraction of Suspicious Traffic from Passive DNSWenbo Wang, Tianning Zang, Yuqing Lan. 190-198 [doi]
- Modular Platform for Customer-Side Detection of BGP Redirection AttacksMarco Silva, António Nogueira, Paulo Salvador. 199-206 [doi]
- Prerequisite to Measure Information Security - A State of the Art Literature ReviewRainer Diesch, Matthias Pfaff, Helmut Krcmar. 207-215 [doi]
- Evaluation of Biometric Template Protection Schemes based on a TransformationChristophe Rosenberger. 216-224 [doi]
- Phishing Through Time: A Ten Year Story based on AbstractsAna Margarida Ferreira, Pedro Manuel Vieira Marques. 225-232 [doi]
- Measuring Identity and Access Management Performance - An Expert Survey on Possible Performance IndicatorsMatthias Hummer, Sebastian Groll, Michael Kunz, Ludwig Fuchs, Günther Pernul. 233-240 [doi]
- Securing the Flow - Data Flow Analysis with Operational Node StructuresMichael Meinig, Christoph Meinel. 241-250 [doi]
- A Cyber Safety Model for Schools in MozambiqueMartina J. Zucule de Barros, Horst Lazarek. 251-258 [doi]
- Hardware-based Cyber ThreatsThiago Alves, Thomas Morris. 259-266 [doi]
- Towards a Personal Identity Code Respecting PrivacyDenis Migdal, Christophe Rosenberger. 267-274 [doi]
- Intrusion Detection System Test Framework for SCADA SystemsHenrik Waagsnes, Nils Ulltveit-Moe. 275-285 [doi]
- Face Spoofing Detection for Smartphones using a 3D Reconstruction and the Motion SensorsKim Trong Nguyen, Cathel Zitzmann, Florent Retraint, Agnès Delahaies, Frédéric Morain-Nicolier, Hoai Phuong Nguyen. 286-291 [doi]
- SAFEPASS - Presenting a Convenient, Portable and Secure Password ManagerOnur Hakbilen, Piraveen Perinparajan, Michael Eikeland, Nils Ulltveit-Moe. 292-303 [doi]
- Cyber Threat Information Classification and Life Cycle Management using Smart ContractsRoman Graf, Ross King. 304-311 [doi]
- Towards Risk-aware Access Control Framework for Healthcare Information SharingMohamed Abomhara, Geir M. Køien, Vladimir A. Oleshchuk, Mohamed Hamid. 312-321 [doi]
- A Risk-aware Access Control Model for Biomedical Research PlatformsRadja Badji, Fida Kamal Dankar. 322-328 [doi]
- Towards an Optimal Template Reduction for Securing Embedded Fingerprint DevicesBenoît Vibert, Christophe Charrier, Jean-Marie Le Bars, Christophe Rosenberger. 329-336 [doi]
- Malicious PDF Documents Detection using Machine Learning Techniques - A Practical Approach with Cloud Computing ApplicationsJosé Torres, Sergio de los Santos. 337-344 [doi]
- Novel Access Control Approach for Inter-organizational WorkflowsAsmaa El Kandoussi, Hanan El Bakkali. 345-352
- Privacy-preserving Biometric Authentication Model for e-Finance ApplicationsChristina-Angeliki Toli, Bart Preneel. 353-360 [doi]
- Alignment-free Cancellable Template Generation for Fingerprint based AuthenticationRumana Nazmul, Md. Rafiqul Islam 0001, Ahsan Raja Chowdhury. 361-366 [doi]
- Who's Driving My Car? A Machine Learning based Approach to Driver IdentificationFabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone. 367-372 [doi]
- Is Bigger Safer? Analyzing Factors Related to Data Breaches using Publicly Available InformationOhud Alqahtani, Zhiyuan Chen, Qiong Huang, Karthik Gottipati. 373-378
- Impact of Code Obfuscation on Android Malware Detection based on Static and Dynamic AnalysisAlessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio. 379-385 [doi]
- AECID: A Self-learning Anomaly Detection Approach based on Light-weight Log Parser ModelsMarkus Wurzenberger, Florian Skopik, Giuseppe Settanni, Roman Fiedler. 386-397 [doi]
- Enhancing Security Education - Recognising Threshold Concepts and Other Influencing FactorsIsmini Vasileiou, Steven Furnell. 398-403 [doi]
- Decoy Systems with Low Energy Bluetooth CommunicationAaron Hunter, Ken Wong. 404-409 [doi]
- Malware Detection based on HTTPS Characteristic via Machine LearningPaul Calderon, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada. 410-417 [doi]
- Using Application Layer Metrics to Detect Advanced SCADA AttacksPeter Maynard, Kieran McLaughlin, Sakir Sezer. 418-425 [doi]
- Towards a Cyber Security Label for SMEs: A European Perspective -Christophe Ponsard, Jeremy Grandclaudon, Gautier Dallons. 426-431 [doi]
- Secure Two-party Agglomerative Hierarchical Clustering ConstructionMona Hamidi, Mina Sheikhalishahi, Fabio Martinelli. 432-437 [doi]
- Back to the Drawing Board - Bringing Security Constraints in an Architecture-centric Software Development ProcessStefanie Jasser, Katja Tuma, Riccardo Scandariato, Matthias Riebisch. 438-446 [doi]
- Querying Encrypted Graph DatabasesNahla Aburawi, Alexei Lisitsa, Frans Coenen. 447-451 [doi]
- Encryption Schemes based on a Single Permutation: PCBC, POFB, PCFB and PCTRKaiyan Zheng, Peng Wang. 452-460 [doi]
- Probability Preservation Property with Relative Error and Its ApplicationsYuanyuan Gao, Kunpeng Wang. 461-468 [doi]
- A Test of Structured Threat Descriptions for Information Security Risk AssessmentsHenrik Karlzén, Johan E. Bengtsson, Jonas Hallberg. 469-476 [doi]
- Unsupervised Holiday Detection from Low-resolution Smart Metering DataGünther Eibl, Sebastian Burkhart, Dominik Engel. 477-486 [doi]
- A Framework for Web Application IntegrityPedro Fortuna, Nuno Pereira 0001, Ismail Butun. 487-493 [doi]
- Attack Tree for Modelling Unauthorized EMV Card Transactions at POS TerminalsDilpreet Singh, Ron Ruhl, Hamman Samuel. 494-502 [doi]
- Statistical and Combinatorial Analysis of the TOR Routing Protocol - Structural Weaknesses Identified in the TOR NetworkEric Filiol, Nicolas J., Maxence Delong. 507-516 [doi]
- VizMal: A Visualization Tool for Analyzing the Behavior of Android MalwareAlessandro Bacci, Fabio Martinelli, Eric Medvet, Francesco Mercaldo. 517-525 [doi]
- APT RPG: Design of a Gamified Attacker/Defender Meta ModelRobert Luh, Marlies Temper, Simon Tjoa, Sebastian Schrittwieser. 526-537 [doi]
- Health State of Google's PlayStore - Finding Malware in Large Sets of Applications from the Android MarketAlexandre Dey, Loic Beheshti, Marie-Kerguelen Sido. 538-544 [doi]
- Acoustic Gait Analysis using Support Vector MachinesJasper Huang, Fabio Di Troia, Mark Stamp. 545-552 [doi]
- Deep Learning versus Gist Descriptors for Image-based Malware ClassificationSravani Yajamanam, Vikash Raja Samuel Selvin, Fabio Di Troia, Mark Stamp. 553-561 [doi]
- Cluster Analysis for Driver Aggressiveness IdentificationFabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Albina Orlando, Antonella Santone. 562-569 [doi]
- Advancing Protocol Fuzzing for Industrial Automation and Control SystemsSteffen Pfrang, David Meier, Michael Friedrich, Jürgen Beyerer. 570-580 [doi]
- Attacks on Industrial Control Systems - Modeling and Anomaly DetectionOliver Eigner, Philipp Kreimel, Paul Tavolato. 581-588 [doi]
- Identifying Insecure Features in Android Applications using Model CheckingFabio Martinelli, Francesco Mercaldo, Vittoria Nardone. 589-596 [doi]
- Autocorrelation Analysis of Financial Botnet TrafficPrathiba Nagarajan, Fabio Di Troia, Thomas H. Austin, Mark Stamp. 599-606 [doi]