Abstract is missing.
- Isn't the Time Ripe for a Standard Ontology on Security of Information and Networks?Atilla Elçi. 1 [doi]
- Trustworthiness of Identity AttributesBrian A. Soeder, K. Suzanne Barber. 4 [doi]
- Mathematical Modelling of Identity, Identity Management and Other Related TopicsMd. Sadek Ferdous, Gethin Norman, Ron Poet. 9 [doi]
- Towards Practical Methods to Protect the Privacy of Location Information with Mobile DevicesChristoph Hochreiner, Markus Huber, Georg Merzdovnik, Edgar R. Weippl. 17 [doi]
- A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour TemplatesSebastian Abt, Sebastian Gärtner, Harald Baier. 25 [doi]
- Deploying Suitable Countermeasures to Solve the Security Problems within an E-learning EnvironmentNeila Rjaibi, Latifa Ben Arfa Rabai. 33 [doi]
- An Approach of Privacy Preserving based Publishing in TwitterAmardeep Singh, Divya Bansal, Sanjeev Sofat. 39 [doi]
- An effectiveness of application of <<Capture The Flag>> competitions concept within higher education (Student contribution)Artem Garkusha, Evgeny Sergeevich Abramov, Oleg B. Makarevich. 43 [doi]
- Autonomic management for convergent networks to support robustness of appliance technologiesAhmad Kamal Ramli, Karim Djemame. 47 [doi]
- Information Security Theory DevelopmentAnatoly Malyuk, Natalia G. Miloslavskaya. 52 [doi]
- A New Perspective to Information Security: Total Quality Information Security ManagementMehrdad Sepehri Sharbaf. 56 [doi]
- Towards an Innovative Systemic Approach of Risk ManagementHervé Cholez, Christophe Feltus. 61 [doi]
- Managing Mobile Device Security in Critical Infrastructure SectorsChalee Vorakulpipat, Chantri Polprasert, Siwaruk Siwamogsatham. 65 [doi]
- A Protocol For Storage Limitations and Upgrades in Decentralised NetworksGreig Paul, James Irvine. 69 [doi]
- Analysing Security requirements in Cloud-based Service Level AgreementsYogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap, Muttukrishnan Rajarajan, Omer F. Rana, G. Spanoudakis. 73 [doi]
- Compliance with standards, assurance and audit: does this equal security?Bob Duncan, Mark Whittington. 77 [doi]
- Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo)Nicolas Mayer, Jocelyn Aubert. 85 [doi]
- Big Data Information Security MaintenanceNatalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergey Zapechnikov. 89 [doi]
- Location Identity Based Content Security Scheme for Content Centric NetworkingFawad Khan, Sarmad Ullah Khan, Muhammad Roman, Usman Abbasi. 95 [doi]
- A Privacy-Preserving E-Ticketing System for Public Transportation Supporting Fine-Granular Billing and Local ValidationIvan Gudymenko. 101 [doi]
- Towards a HL7 based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records AdministrationChristophe Feltus, Damien Nicolas, Claude Poupart. 109 [doi]
- Privacy Implications of Wearable Health DevicesGreig Paul, James Irvine. 117 [doi]
- Negotiation Based Framework for Attribute-Based Access Control Policy EvaluationEdward Caprin, Yan Zhang. 122 [doi]
- Design and Analysis of a New Hash Function GearMohammad A. AlAhmad, Imad Fakhri Alshaikhli. 128 [doi]
- Differential Fault Analysis for Block Ciphers: an Automated Conservative AnalysisGiovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale. 137 [doi]
- Improbable Differential Attacks on Serpent using Undisturbed BitsCihangir Tezcan, Halil Kemal Taskin, Murat Demircioglu. 145 [doi]
- HISEC: A New Lightweight Block Cipher AlgorithmSufyan Salim Mahmood AlDabbagh, Imad Fakhri Taha Al Shaikhli, Mohammad A. AlAhmad. 151 [doi]
- Known Plaintexts Attack on Polynomial based Homomorphic EncryptionAlina Trepacheva, Liudmila Babenko. 157 [doi]
- Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc NetworkMaryam Farajzadeh Zanjani, Seyed Masoud Alavi Abhari, Alexander G. Chefranov. 166 [doi]
- Human Visualisation of Cryptographic Code Using Progressive Multi-Scale ResolutionAlwyn Goh, Geong Sen Poh, Voon-Yee Vee, Kok Boon Chong, Xin Zhe Khooi, Chanan Zhuo Ern Loh, Zhi Yuan Eng. 170 [doi]
- Memory access time as entropy source for RNGSergey Agafin, Anton Krasnopevtsev. 176 [doi]
- Mathematical model of the polyalphabetic information security system based on the normal generalized knapsackOsipyan V. O.. 180 [doi]
- Symmetric Fully Homomorphic Encryption Using Decidable Matrix EquationsPhilipp Burtyka, Oleg B. Makarevich. 186 [doi]
- Bandwidth-Optimized Parallel Private Information RetrievalEcem Ünal, Erkay Savas. 197 [doi]
- Cryptanalysis of Polynomial based Homomorphic EncryptionAlina Trepacheva. 205 [doi]
- An Order Preserving Encryption Scheme for Cloud ComputingVikas Jaiman, Gaurav Somani. 211 [doi]
- Identification and Detection of Phishing Emails Using Natural Language Processing TechniquesShivam Aggarwal, Vishal Kumar, S. D. Sudarsan. 217 [doi]
- On the Possibility of Insider Threat Detection Using Physiological Signal MonitoringAbdulaziz Almehmadi, Khalil El-Khatib. 223 [doi]
- Continuous Authentication using Fuzzy LogicSoumik Mondal, Patrick Bours. 231 [doi]
- An Empirical Study of Smartphone Based Iris Recognition in Visible SpectrumKiran B. Raja, R. Raghavendra, Christoph Busch, Soumik Mondal. 239 [doi]
- Detecting Malicious Users in Twitter using ClassifiersMonika Singh, Divya Bansal, Sanjeev Sofat. 247 [doi]
- The Uncertainty of Identity Toolset: Analysing Digital Traces for User ProfilingMuhammad Adnan, Antonio Lima, Luca Rossi, Suresh Veluru, Paul A. Longley, Mirco Musolesi, Muttukrishnan Rajarajan. 254 [doi]
- Implementation of Safety Techniques in a Cyber DomainMaria Evangelopoulou, Christopher W. Johnson. 261 [doi]
- Exploring the Guessability of Image PasswordsSoumyadeb Chowdhury, Ron Poet, Lewis Mackenzie. 264 [doi]
- Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social NetworksHani Moaiteq Aljahdali, Ron Poet. 272 [doi]
- Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical PasswordsHani Moaiteq Aljahdali, Ron Poet. 279 [doi]
- Implementation Aspects of MeterGoat, a Smart Meter Security Training PlatformParth Bhatt, Johny de Souza, Nelson Uto, Jefferson Capovilla, Jose Resende, Danilo Suiama. 284 [doi]
- An ID and Address Protection Unit for NoC based Communication ArchitecturesAhmed Saeed, Ali Ahmadinia, Mike Just, Christophe Bobda. 288 [doi]
- GLoP: Enabling Massively Parallel Incident Response Through GPU Log ProcessingXavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham. 295 [doi]
- A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection SystemsXavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham. 302 [doi]
- Physical Dangers in the Cyber Security and Precautions to be TakenEcir U. Küçüksille, Mehmet Ali Yalçinkaya, Ozan Uçar. 310 [doi]
- Employing Neural Networks for the Detection of SQL Injection AttackNaghmeh Moradpoor Sheykhkanloo. 318 [doi]
- Framework for distributed virtual honeynetsPeter Pisarcík, Pavol Sokol. 324 [doi]
- HosTaGe: a Mobile Honeypot for Collaborative DefenseEmmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer. 330 [doi]
- Challenges in developing Capture-HPC exclusion listsMohammad Puttaroo, Peter Komisarczuk, Renato Cordeiro de Amorim. 334 [doi]
- Instrumental System for Analysis of Information Systems Using Smart Cards ProtectionLudmila Babenko, Oleg Makarevich, Dmitry Bespalov, Roman Chesnokov, Yaroslav Trubnikov. 339 [doi]
- Reverse Engineering of ARM Binaries Using Formal TransformationsTobias F. Pfeffer, Paula Herber, Jörg Schneider 0001. 345 [doi]
- Automated Session Fixation Vulnerability Detection in Web Applications using the Set-Cookie HTTP response header in cookiesRahul Kumar, Indraveni K, Aakash Kumar Goel. 351 [doi]
- Analyzing the Effectiveness of DoS Attacks on TorBernd Conrad, Fatemeh Shirazi. 355 [doi]
- Content Provider Leakage Vulnerability Detection in Android ApplicationsHossain Shahriar, Hisham M. Haddad. 359 [doi]
- Non-cryptographic Detection Approach and Countermeasure for JFDV AttackAvani Sharma, Rajbir Kaur. 367 [doi]
- Towards the Detection of Undetectable Metamorphic MalwareJikku Kuriakose, Vinod P.. 373 [doi]
- Exploring Worm Behaviors using DTWSmita Naval, Vijay Laxmi, Neha Gupta, Manoj Singh Gaur, Muttukrishnan Rajarajan. 379 [doi]
- Implementation of an Adaptive Traffic-aware FirewallAshok Singh Sairam, Rahul Kumar, Pratima Biswas. 385 [doi]
- MapReduce: MR Model Abstraction for Future Security StudyIbrahim Lahmer, Ning Zhang. 392 [doi]
- Intrusion Detection System for Cloud EnvironmentHifaa Bait Baraka, Huaglory Tianfield. 399 [doi]
- Virtual Machine IntrospectionThu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana. 405 [doi]
- Current Trends and the Future of Metamorphic Malware DetectionShahid Alam, Issa Traoré, Ibrahim Sogukpinar. 411 [doi]
- Integrated Framework for Classification of MalwaresEkta Gandotra, Divya Bansal, Sanjeev Sofat. 417 [doi]
- Dynamic Analysis of Web ObjectsKomminist Weldemariam, Hossain Shahriar, Vamshee Krishna Devendran. 423 [doi]
- Classification of PE Files using Static AnalysisAshish Saini, Ekta Gandotra, Divya Bansal, Sanjeev Sofat. 429 [doi]
- Plugin in the Middle - Minimising Security Risks in Mobile Middleware ImplementationsPeter Aufner, Georg Merzdovnik, Markus Huber, Edgar R. Weippl. 434 [doi]
- Analysis of Identity Forging Attack in MANETsNishant Garg, Kuldeep Pareek, Manoj Singh Gaur, Vijay Laxmi, Chhagan Lal. 441 [doi]
- Development of a Threat Model for Vehicular Ad-hoc Network based Accident Warning SystemsNiaz Morshed Chowdhury, Lewis M. Mackenzie. 447 [doi]
- The Botnet Revenue ModelGiovanni Bottazzi, Gianluigi Me. 459 [doi]
- Efficient Protection of Response Messages in DTLS-Based Secure Multicast CommunicationMarco Tiloca. 466 [doi]
- In-Cloud Malware Analysis and Detection: State of the ArtShahid Alam, Ibrahim Sogukpinar, Issa Traoré, Yvonne Coady. 473 [doi]
- Applying Large-scale Adaptive Graphs to Modeling Internet of Things SecurityTatiana Stepanova, Dmitry P. Zegzhda. 479 [doi]
- A Novel Authentication Scheme for Online TransactionsParaskevas Sarris, Lewis Mackenzie, Soumyadeb Chowdhury. 483 [doi]
- CBR Clone Based Software Flaw Detection IssuesAli Reza Honarvar, Ashkan Sami. 487 [doi]
- Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster)Hui Lin, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 492 [doi]
- Traversing symmetric NAT with predictable port allocationDusan Klinec, Vashek Matyás. 543 [doi]