Abstract is missing.
- Securing the Internet: Fact or Fiction?Basie von Solms. 1-8 [doi]
- Open Research Questions of Privacy-Enhanced Event SchedulingBenjamin Kellermann. 9-19 [doi]
- Event Handoff Unobservability in WSNStefano Ortolani, Mauro Conti, Bruno Crispo, Roberto Di Pietro. 20-28 [doi]
- Emerging and Future Cyber Threats to Critical SystemsEdita Djambazova, Magnus Almgren, Kiril Dimitrov, Erland Jonsson. 29-46 [doi]
- Adversarial Security: Getting to the Root of the ProblemRaphael C.-W. Phan, John N. Whitley, David J. Parish. 47-55 [doi]
- Practical Experiences with Purenet, a Self-Learning Malware Prevention SystemAlapan Arnab, Tobias Martin, Andrew Hutchison. 56-69 [doi]
- A Biometrics-Based Solution to Combat SIM Swap FraudLouis Jordaan, Basie von Solms. 70-87 [doi]
- Are BGP Routers Open to Attack? An ExperimentLudovico Cavedon, Christopher Kruegel, Giovanni Vigna. 88-103 [doi]
- Securing the Core University Business ProcessesVeliko Ivanov, Monika Tzaneva, Alexandra Murdjeva, Valentin S. Kisimov. 104-116 [doi]
- Real-Time System for Assessing the Information Security of Computer NetworksDimitrina Polimirova, Eugene Nickolov. 123-133 [doi]
- Evidential Notions of Defensibility and Admissibility with Property PreservationRaphael C.-W. Phan, Ahmad Roshidi Amran, John N. Whitley, David J. Parish. 134-139 [doi]
- Cloud Infrastructure SecurityDimiter Velev, Plamena Zlateva. 140-148 [doi]
- The Need for Interoperable Reputation SystemsSandra Steinbrecher. 159-169 [doi]