Abstract is missing.
- Modelling of 802.11 4-Way Handshake Attacks and Analysis of Security PropertiesRajiv Ranjan Singh, José Moreira, Tom Chothia, Mark D. Ryan. 3-21 [doi]
- Reducing the Forensic Footprint with Android Accessibility AttacksYonas Leguesse, Mark Vella, Christian Colombo, Julio Hernandez-Castro. 22-38 [doi]
- A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real TimeVishal Arora, Manoj Misra. 39-54 [doi]
- Revocable Access to Encrypted Message BoardsFabian Schillinger, Christian Schindelhauer. 57-72 [doi]
- Establishing Secure Communication Channels Using Remote Attestation with TPM 2.0Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer. 73-89 [doi]
- Improved Feature Engineering for Free-Text Keystroke DynamicsEden Abadi, Itay Hazan. 93-105 [doi]
- Subversion-Resistant Commitment Schemes: Definitions and ConstructionsKarim Baghery. 106-122 [doi]
- Challenges in IT Security Processes and Solution Approaches with Process MiningAynesh Sundararaj, Silvia Knittl, Jens Grossklags. 123-138 [doi]