Abstract is missing.
- Exploring Timeline-Based Malware ClassificationRafiqul Islam, Irfan Altas, Md. Saiful Islam 0003. 1-13 [doi]
- Screening Smartphone Applications Using Behavioral SignaturesSuyeon Lee, Jehyun Lee, Heejo Lee. 14-27 [doi]
- Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation PreventionTheodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mengmeng Ge. 28-41 [doi]
- Evolving a Secure InternetWilliam J. Caelli, Lam-for Kwok, Dennis Longley. 42-54 [doi]
- Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile PhonesYuxin Meng, Wenjuan Li, Lam-for Kwok. 55-68 [doi]
- Applying DAC Principles to the RDF Graph Data ModelSabrina Kirrane, Alessandra Mileo, Stefan Decker. 69-82 [doi]
- A Lightweight Gait Authentication on Mobile Phone Regardless of Installation ErrorThang Hoang, Deokjai Choi, Quang Viet Vo, Huy Anh Nguyen, Thuc Dinh Nguyen. 83-101 [doi]
- A Vulnerability in the Song Authentication Protocol for Low-Cost RFID TagsSarah Abughazalah, Konstantinos Markantonakis, Keith Mayes. 102-110 [doi]
- Extraction of ABNF Rules from RFCs to Enable Automated Test Data GenerationMarkus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig. 111-124 [doi]
- Key Derivation Function: The SCKDF SchemeChuah Chai Wen, Ed Dawson, Leonie Simpson. 125-138 [doi]
- Sustainable Pseudo-random Number GeneratorHuafei Zhu, Wee Siong Ng, See-Kiong Ng. 139-147 [doi]
- Improving Mobile Device Security with Operating System-Level VirtualizationSascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert. 148-161 [doi]
- Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable ExperimentationKarl-Peter Fuchs, Dominik Herrmann, Hannes Federrath. 162-175 [doi]
- An Empirical Evaluation of the Android Security FrameworkAlessandro Armando, Alessio Merlo, Luca Verderame. 176-189 [doi]
- A Security Engineering Process Approach for the Future Development of Complex Aircraft Cabin SystemsHartmut Hintze, Benjamin Wiegraefe, Ralf God. 190-202 [doi]
- Mobile Device Encryption SystemsPeter Teufl, Thomas Zefferer, Christof Stromberger. 203-216 [doi]
- Smartphone Volatile Memory Acquisition for Security Analysis and Forensics InvestigationVrizlynn L. L. Thing, Zheng-Leong Chua. 217-230 [doi]
- Program Transformation for Non-interference Verification on Programs with PointersMounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel. 231-244 [doi]
- A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations SystemEzzat Alqurashi, Gary Wills, Lester Gilbert. 245-256 [doi]
- A Review of the Theory of Planned Behaviour in the Context of Information Security Policy ComplianceTeodor Sommestad, Jonas Hallberg. 257-271 [doi]
- Enforcement of Privacy RequirementsPadmanabhan Krishnan, Kostyantyn Vorobyov. 272-285 [doi]
- Towards Security-Enhanced and Privacy-Preserving Mashup CompositionsHeidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar Weippl. 286-299 [doi]
- On Privacy-Preserving Ways to Porting the Austrian eID System to the Public CloudBernd Zwattendorfer, Daniel Slamanig. 300-314 [doi]
- Using the Conflicting Incentives Risk Analysis MethodLisa Rajbhandari, Einar Snekkenes. 315-329 [doi]
- Performance Analysis of Scalable Attack Representation ModelsJin B. Hong, Dong Seong Kim. 330-343 [doi]
- ADAPT: A Game Inspired Attack-Defense and Performance Metric TaxonomyChris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, Vivek Shandilya. 344-365 [doi]
- Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to EmailsKathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram. 366-378 [doi]
- Phishing and Organisational LearningWayne D. Kearney, Hennie A. Kruger. 379-390 [doi]
- A Case for Societal Digital Security CultureLotfi Ben Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat K. Bhargava, Mohd Murtadha Mohamad. 391-404 [doi]
- Secure Outsourcing: An Investigation of the Fit between Clients and ProvidersGurpreet Dhillon, Romilla Chowdhuri, Filipe de Sá-Soares. 405-418 [doi]
- Performance Analysis of File Carving ToolsThomas Laurenson. 419-433 [doi]