Abstract is missing.
- Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining AgileJanusz Górski, Katarzyna Lukasiewicz. 3-15 [doi]
- Adapting Enterprise Security Approaches for Evolving Cloud Processing and Networking ModelsAndrew Hutchison. 16-27 [doi]
- Data Mining and Information SecurityAlexander A. Grusho. 28-33 [doi]
- Extending FAST-CPS for the Analysis of Data Flows in Cyber-Physical SystemsLaurens Lemaire, Jan Vossaert, Bart De Decker, Vincent Naessens. 37-49 [doi]
- Visualization-Driven Approach to Anomaly Detection in the Movement of Critical InfrastructureEvgenia Novikova, Ivan Murenin. 50-61 [doi]
- Detection and Mitigation of Time Delay Injection Attacks on Industrial Control Systems with PLCsEmrah Korkmaz, Matthew Davis, Andrey M. Dolgikh, Victor A. Skormin. 62-74 [doi]
- Choosing Models for Security Metrics VisualizationMaxim Kolomeec, Gustavo Gonzalez Granadillo, Elena Doynikova, Andrey Chechulin, Igor V. Kotenko, Hervé Debar. 75-87 [doi]
- iCrawl: A Visual High Interaction Web CrawlerDeeraj Nagothu, Andrey M. Dolgikh. 91-103 [doi]
- Race Condition Faults in Multi-core SystemsLeonard J. Popyack, Jay Biernat. 104-114 [doi]
- Security Requirements for the Deployment of Services Across Tactical SOAVasileios Gkioulos, Stephen D. Wolthusen. 115-127 [doi]
- Nodal Cooperation Equilibrium Analysis in Multi-hop Wireless Ad Hoc Networks with a Reputation SystemJerzy Konorski, Karol Rydzewski. 131-142 [doi]
- Network Anomaly Detection Based on an Ensemble of Adaptive Binary ClassifiersAlexander Branitskiy, Igor V. Kotenko. 143-157 [doi]
- Cardholder's Reputation System for Contextual Risk Management in Payment TransactionsAlbert Sitek, Zbigniew Kotulski. 158-170 [doi]
- Towards Self-aware Approach for Mobile Devices SecurityNanda Kumar Thanigaivelan, Ethiopia Nigussie, Seppo Virtanen, Jouni Isoaho. 171-182 [doi]
- Resident Security System for Government/Industry Owned ComputersMatthew Davis, Emrah Korkmaz, Andrey M. Dolgikh, Victor A. Skormin. 185-194 [doi]
- tLab: A System Enabling Malware Clustering Based on Suspicious Activity TreesAnton Kopeikin, Arnur G. Tokhtabayev, Nurlan Tashatov, Dina Satybaldina. 195-210 [doi]
- Malware Analysis and Detection via Activity Trees in User-Dependent EnvironmentArnur G. Tokhtabayev, Anton Kopeikin, Nurlan Tashatov, Dina Satybaldina. 211-222 [doi]
- A Concept of Clustering-Based Method for Botnet DetectionHubert Ostap, Ryszard Antkiewicz. 223-234 [doi]
- Easy 4G/LTE IMSI Catchers for Non-ProgrammersStig Fr. Mjølsnes, Ruxandra F. Olimid. 235-246 [doi]
- Anomaly Detection in Cognitive Radio Networks Exploiting Singular Spectrum AnalysisQi Dong, Zekun Yang, Yu Chen 0002, Xiaohua Li, Kai Zeng 0001. 247-259 [doi]
- HEPPA: Highly Efficient Privacy Preserving Authentication for ITSAn Braeken, Sergey Bezzateev, Abdellah Touhafi, Natalia Voloshina. 260-271 [doi]
- Automated Cryptographic Analysis of the Pedersen Commitment SchemeRoberto Metere, Changyu Dong. 275-287 [doi]
- Steganalysis Based on Statistical Properties of the Encrypted MessagesValery I. Korzhik, Ivan Fedyanin, Artur Godlewski, Guillermo Morales-Luna. 288-298 [doi]
- Security Assessment of Cryptographic AlgorithmsMarcin Niemiec, Maciej Francikiewicz. 299-312 [doi]
- Quick Response Code Secure: A Cryptographically Secure Anti-Phishing Tool for QR Code AttacksVasileios Mavroeidis, Mathew Nicho. 313-324 [doi]
- A Novel and Unifying View of Trustworthiness in Cyberphysical SystemsSteven Drager, Janusz Zalewski. 327-338 [doi]
- Information Security of SDN on the Basis of Meta DataAlexander A. Grusho, Nick A. Grusho, Michael I. Zabezhailo, Alexander Zatsarinny, Elena E. Timonina. 339-347 [doi]
- Toward Third-Party Immune ApplicationsOmar Iraqi, Hanan El Bakkali. 348-359 [doi]