Abstract is missing.
- Applying Internal Interface Diversification to IoT Operating SystemsLauri Koivunen, Sampsa Rauti, Ville Leppänen. 1-5 [doi]
- Defeating the Database Adversary Using Deception - A MySQL Database HoneypotMathias Wegerer, Simon Tjoa. 6-10 [doi]
- On the Automation of Security TestingFranz Wotawa. 11-16 [doi]
- The Applicability of Fuzzy Rough Classifier for Continuous Person AuthenticationMarlies Temper, Simon Tjoa. 17-23 [doi]
- Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based Mobile AppsSu Yeon Choi, Hae Young Lee. 24 [doi]
- Towards a Methodology for the Development of Secure Cryptographic SoftwareAlexandre Melo Braga, Ricardo Dahab. 25-30 [doi]
- Security Requirements Engineering: A Systematic Mapping (2010-2015)Naurin Farooq Khan, Naveed Ikram. 31-36 [doi]
- An Experimental Approach to Reputation in E-ParticipationIgor Serov, Maria Leitner. 37-42 [doi]
- A Security Analysis of Paid Subscription Video-on-Demand Services for Online LearningSora Lee, Jinwoo Kim, SangJun Ko, Hyoungshick Kim. 43-48 [doi]
- A Framework for Detecting MAC and IP Spoofing Attacks with Network CharacteristicsJaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh. 49-53 [doi]
- Assessment of Server State via Inter-Clone DifferencesMartin Pirker, Andreas Nusser. 54-59 [doi]
- Catch Me if You Can! Transparent Detection of ShellcodeDamjan Buhov, Richard Thron, Sebastian Schrittwieser. 60-63 [doi]
- Detection of Man-in-the-Middle Attacks on Industrial Control NetworksOliver Eigner, Philipp Kreimel, Paul Tavolato. 64-69 [doi]
- Overview of Root Causes of Software Vulnerabilities - Technical and User-Side PerspectivesPriya Anand. 70-74 [doi]
- Decoder-Free Sino-Korean ShellcodeJi-Hyeon Yoon, Jeong Oh Kye, Yongdae Kim, Hae Young Lee. 75-78 [doi]