Abstract is missing.
- Hunting Brand Domain Forgery: A Scalable Classification for Homograph AttackTran Phuong Thao, Yukiko Sawaya, Hoang-Quoc Nguyen-Son, Akira Yamada, Kazumasa Omote, Ayumu Kubota. 3-18 [doi]
- GanDef: A GAN Based Adversarial Training Defense for Neural Network ClassifierGuanxiong Liu, Issa Khalil, Abdallah Khreishah. 19-32 [doi]
- Control Logic Injection Attacks on Industrial Control SystemsHyunguk Yoo, Irfan Ahmed. 33-48 [doi]
- An Efficient and Scalable Intrusion Detection System on Logs of Distributed ApplicationsDavid Lanoë, Michel Hurfin, Eric Totel, Carlos Maziero. 49-63 [doi]
- Performance of Password Guessing Enumerators Under Cracking ConditionsMathieu Valois, Patrick Lacharme, Jean-Marie Le Bars. 67-80 [doi]
- An Offline Dictionary Attack Against zkPAKE ProtocolJosé Becerra, Peter Y. A. Ryan, Petra Sala, Marjan Skrobot. 81-90 [doi]
- Fine-Grained Access Control in Industrial Internet of Things - Evaluating Outsourced Attribute-Based EncryptionDominik Ziegler, Josef Sabongui, Gerald Palfinger. 91-104 [doi]
- Towards an Automated Extraction of ABAC Constraints from Natural Language PoliciesManar Alohaly, Hassan Takabi, Eduardo Blanco 0002. 105-119 [doi]
- Removing Problems in Rule-Based PoliciesZheng Cheng, Jean-Claude Royer, Massimo Tisi. 120-133 [doi]
- Is This Really You? An Empirical Study on Risk-Based Authentication Applied in the WildStephan Wiefling, Luigi Lo Iacono, Markus Dürmuth. 134-148 [doi]
- Differentially Private Generative Adversarial Networks for Time Series, Continuous, and Discrete Open DataLorenzo Frigerio, Anderson Santana de Oliveira, Laurent Gomez, Patrick Duverger. 151-164 [doi]
- ESARA: A Framework for Enterprise Smartphone Apps Risk AssessmentMajid Hatamian, Sebastian Pape 0001, Kai Rannenberg. 165-179 [doi]
- SocialAuth: Designing Touch Behavioral Smartphone User Authentication Based on Social Networking ApplicationsWeizhi Meng, Wenjuan Li, Lijun Jiang, Jianying Zhou. 180-193 [doi]
- The Influence of Organizational, Social and Personal Factors on Cybersecurity Awareness and Behavior of Home Computer UsersJoëlle Simonet, Stephanie Teufel. 194-208 [doi]
- To Be, or Not to Be Notified - Eliciting Privacy Notification Preferences for Online mHealth ServicesPatrick Murmann, Delphine Reinhardt, Simone Fischer-Hübner. 209-222 [doi]
- A Structured Comparison of the Corporate Information Security Maturity LevelMichael Schmid, Sebastian Pape 0001. 223-237 [doi]
- Predicting Students' Security Behavior Using Information-Motivation-Behavioral Skills ModelAli Farooq, Debora Jeske, Jouni Isoaho. 238-252 [doi]
- Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonymDavid Harborth, Xinyuan Cai, Sebastian Pape. 253-267 [doi]
- Arcana: Enabling Private Posts on Public Microblog PlatformsAnirudh Narasimman, Qiaozhi Wang, FengJun Li, Dongwon Lee 0001, Bo Luo. 271-285 [doi]
- Fast Keyed-Verification Anonymous Credentials on Standard Smart CardsJan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny. 286-298 [doi]
- BlockTag: Design and Applications of a Tagging System for Blockchain AnalysisYazan Boshmaf, Husam Al Jawaheri, Mashael Al Sabah. 299-313 [doi]
- Forward Secure Identity-Based Signature Scheme with RSAHankyung Ko, Gweonho Jeong, Jongho Kim, Jihye Kim, Hyunok Oh. 314-327 [doi]
- On the Effectiveness of Control-Flow Integrity Against Modern Attack TechniquesSarwar Sayeed, Hector Marco-Gisbert. 331-344 [doi]
- Automatically Proving Purpose Limitation in Software ArchitecturesKai Bavendiek, Tobias Mueller, Florian Wittner, Thea Schwaneberg, Christian-Alexander Behrendt, Wolfgang Schulz, Hannes Federrath, Sibylle Schupp. 345-358 [doi]
- Commit Signatures for Centralized Version Control SystemsSangat Vaidya, Santiago Torres-Arias, Reza Curtmola, Justin Cappos. 359-373 [doi]
- Towards Contractual Agreements for Revocation of Online DataTheodor Schnitzler, Markus Dürmuth, Christina Pöpper. 374-387 [doi]