| 2010 | 2-clickAuth. Anna Vapen, David Byers, Nahid Shahmehri |
| 2010 | A Complexity Based Model for Quantifying Forensic Evidential Probabilities. Richard E. Overill, Jantje A. M. Silomon, Kam-Pui Chow |
| 2010 | A Computer Architecture with Hardwarebased Malware Detection. Klaus Hildebrandt, Igor Podebrad, Bernd Klauer |
| 2010 | A Consideration of the Reliability of Registration and Attribute Exchange. Yoshio Kakizaki, Keiichi Iwamura |
| 2010 | A Continuous Authentication System Based on User Behavior Analysis. Ines Brosso, Alessandro La Neve, Graça Bressan, Wilson Vicente Ruggiero |
| 2010 | A Design Pattern for Event-Based Processing of Security-Enriched SOAP Messages. Nils Gruschka, Meiko Jensen, Luigi Lo Iacono |
| 2010 | A Formal Approach Towards Risk-Aware Service Level Analysis and Planning. Stefan Jakoubi, Simon Tjoa, Sigrun Goluch, Gerhard Kitzler |
| 2010 | A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations. Talania Grobler, C. P. Louwrens, Sebastiaan H. von Solms |
| 2010 | A Function Oriented Methodology to Validate and Verify Forensic Copy Function of Digital Forensic Tools. Yinghua Guo, Jill Slay |
| 2010 | A Generic Metamodel for IT Security. André Miede, Nedislav Nedyalkov, Christian Gottron, André König, Nicolas Repp, Ralf Steinmetz |
| 2010 | A Model for Computer Profiling. Andrew Marrington, George M. Mohay, Hasmukh Morarji, Andrew J. Clark |
| 2010 | A Multi-component View of Digital Forensics. Talania Grobler, C. P. Louwrens, Sebastiaan H. von Solms |
| 2010 | A Multi-stage Methodology for Ensuring Appropriate Security Culture and Governance. Solange Ghernaouti-Helie, Igli Tashi, David Simms |
| 2010 | A National Strategy for an Effective Cybersecurity Approach and Culture. Solange Ghernaouti-Helie |
| 2010 | A New DRM Architecture with Strong Enforcement. Sascha Müller, Stefan Katzenbeisser |
| 2010 | A Novel Image Hiding Scheme Using Content Aware Seam Carving Method. Zahra Toony, Mansour Jamzad |
| 2010 | A Probabilistic Approach for On-Line Sum-Auditing. Gerardo Canfora, Bice Cavallo |
| 2010 | A Prototype for Support of Computer Forensic Analysis Combined with the Expected Knowledge Level of an Attacker to More Efficiently Achieve Investigation Results. Maximilian Bielecki, Gerald Quirchmayr |
| 2010 | A Secure and Scalable Grid-Based Content Management System. Benjamin Aziz, Alvaro Arenas, Giovanni Cortese, Bruno Crispo, Silvio Causetti |
| 2010 | A Security Decision-Reaction Architecture for Heterogeneous Distributed Network. Christophe Feltus, Djamel Khadraoui, Jocelyn Aubert |
| 2010 | A Semantic Security Architecture for Web Services. Stefan Durbeck, Christoph Fritsch, Günther Pernul, Rolf Schillinger |
| 2010 | A Semi-Markov Survivability Evaluation Model for Intrusion Tolerant Database Systems. Alex Hai Wang, Su Yan, Peng Liu |
| 2010 | A Taxonomy Refining the Security Requirements for Electronic Voting: Analyzing Helios as a Proof of Concept. Lucie Langer, Axel Schmidt, Johannes Buchmann, Melanie Volkamer |
| 2010 | ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland |
| 2010 | Affects of Queuing Mechanisms on RTP Traffic: Comparative Analysis of Jitter, End-to-End Delay and Packet Loss. Gregory Epiphaniou, Carsten Maple, Paul Sant, Matthew Reeve |
| 2010 | An Adaptive Redundancy Oriented Method to Tolerate Soft Errors in SRAM-Based FPGAs Using Unused Resources. Somayeh Bahramnejad, Hamid R. Zarandi |
| 2010 | An Analysis of Information Security Awareness within Home and Work Environments. Shuhaili Talib, Nathan L. Clarke, Steven Furnell |
| 2010 | An Improvement of Robustness Against Physical Attacks and Equipment Independence in Information Hiding Based on the Artificial Fiber Pattern. Kitahiro Kaneda, Yuki Fujii, Keiichi Iwamura, Seiichiro Hangai |
| 2010 | Analysing and Visualising Security and Usability in IRIS. Shamal Faily, Ivan Flechais |
| 2010 | Analysis of Transient Faults on a MIPS-Based Dual-Core Processor. Iman Faraji, Moslem Didehban, Hamid R. Zarandi |
| 2010 | Analytical Approach to Attack Graph Analysis for Network Security. Phongphun Kijsanayothin, Rattikorn Hewett |
| 2010 | Application and Economic Implications of an Automated Requirement-Oriented and Standard-Based Compliance Monitoring and Reporting Prototype. Matthias Kehlenbeck, Thorben Sandner, Michael H. Breitner |
| 2010 | Architecture-Aware Adaptive Deployment of Contextual Security Policies. Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Laurent Toutain |
| 2010 | Binomial-Mix-Based Location Anonymizer System with Global Dummy Generation to Preserve User Location Privacy in Location-Based Services. Minh-Triet Tran, Isao Echizen, Anh Duc Duong |
| 2010 | Blind Steganalysis: A Countermeasure for Binary Image Steganography. Chiew Kang Leng, Josef Pieprzyk |
| 2010 | Challenging IS and ISM Standardization for Business Benefits. Juhani Anttila, Jorma Kajava |
| 2010 | Choosing Authentication Techniques in E-procurement System in Serbia. Milos Milovanovic, Marija Bogicevic, Miroslav Lazovic, Dejan B. Simic, Dusan Starcevic |
| 2010 | Classification of Buffer Overflow Vulnerability Monitors. Hossain Shahriar, Mohammad Zulkernine |
| 2010 | Combining Misuse Cases with Attack Trees and Security Activity Models. Inger Anne Tøndel, Jostein Jensen, Lillian Røstad |
| 2010 | Communal Reputation and Individual Trust (CRIT) in Wireless Sensor Networks. Tanveer A. Zia, Md Zahidul Islam |
| 2010 | Configuration Fuzzing for Software Vulnerability Detection. Huning Dai, Christian Murphy, Gail E. Kaiser |
| 2010 | Detection of Spyware by Mining Executable Files. Raja Khurram Shahzad, Syed Imran Haider, Niklas Lavesson |
| 2010 | Development of ICT Infrastructure for Local Socio-Economic System in Japan. Hiroshi Nagano |
| 2010 | Dual-Level Attack Detection and Characterization for Networks under DDoS. Anjali Sardana, Ramesh Chandra Joshi |
| 2010 | Enhanced Chaotic Stream Cipher for WSNs. Rui Miguel Soares Silva, Rui Gustavo Nunes Pereira Crespo, Mário Serafim dos Santos Nunes |
| 2010 | Estimating Hidden Message Length in Binary Image Embedded by Using Boundary Pixels Steganography. Chiew Kang Leng, Josef Pieprzyk |
| 2010 | Experimental Results on Cheon's Algorithm. Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda |
| 2010 | Extending the Gordon and Loeb Model for Information Security Investment. Jan Willemson |
| 2010 | External Insider Threat: A Real Security Challenge in Enterprise Value Webs. Virginia N. L. Franqueira, André van Cleeff, Pascal van Eck, Roel J. Wieringa |
| 2010 | FaT2D: Fault Tolerant Directed Diffusion for Wireless Sensor Networks. Fatima-Zohra Benhamida, Yacine Challal |
| 2010 | FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management. Thorsten Höllrigl, Jochen Dinger, Hannes Hartenstein |
| 2010 | Fighting Phishing with Trusted Email. Jordan Crain, Lukasz Opyrchal, Atul Prakash |
| 2010 | Formal Specification and Analysis of an E-voting System. Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita |
| 2010 | Formalization of Viruses and Malware Through Process Algebras. Grégoire Jacob, Eric Filiol, Hervé Debar |
| 2010 | From Contextual Permission to Dynamic Pre-obligation: An Integrated Approach. Yehia Elrakaiby, Frédéric Cuppens, Nora Cuppens-Boulahia |
| 2010 | Heuristics for Detecting Botnet Coordinated Attacks. Kazuya Kuwabara, Hiroaki Kikuchi, Masato Terada, Masashi Fujiwara |
| 2010 | Identifying Security Relevant Warnings from Static Code Analysis Tools through Code Tainting. Dejan Baca |
| 2010 | Improving Effectiveness of Intrusion Detection by Correlation Feature Selection. Hai Nguyen, Katrin Franke, Slobodan Petrovic |
| 2010 | Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming. Jorge Blasco Alís, Agustín Orfila, Arturo Ribagorda |
| 2010 | Information Flow Control Using the Java Virtual Machine Tool Interface (JVMTI). Jason Howarth, Irfan Altas, Barney Dalgarno |
| 2010 | Information Flow in Disaster Management Systems. Achim D. Brucker, Dieter Hutter |
| 2010 | Investigating the Limitations of Java Annotations for Input Validation. Federico Mancini, Dag Hovland, Khalid A. Mughal |
| 2010 | Katana: A Hot Patching Framework for ELF Executables. Ashwin Ramaswamy, Sergey Bratus, Sean W. Smith, Michael E. Locasto |
| 2010 | LSM-Based Secure System Monitoring Using Kernel Protection Schemes. Takamasa Isohara, Keisuke Takemori, Yutaka Miyake, Ning Qu, Adrian Perrig |
| 2010 | Large Scale Demonstration Experiments Towards Acheiving Practical Traceback on the Internet. Ken Wakasa, Hiroaki Hazeyama, Toshifumi Kai, Akira Hashiguchi, Masaya Yamagata, Masahiko Fujinaga, Ryunosuke Ohshima, Takashi Shintani |
| 2010 | Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection. Neminath Hubballi, Santosh Biswas, Sukumar Nandi |
| 2010 | Log Analysis Towards an Automated Forensic Diagnosis System. Jorge Herrerías Guerrero, Roberto Gómez Cárdenas |
| 2010 | Managing the Asset Risk of SMEs. Luis Enrique Sánchez, Carlos Ruiz, Eduardo Fernández-Medina, Mario Piattini |
| 2010 | Measuring the Level of Security Introduced by Security Patterns. Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki, Michael VanHilst |
| 2010 | Model-Driven Application-Level Encryption for the Privacy of E-health Data. Yun Ding, Karsten Klein |
| 2010 | Model-Driven Security Patterns Application Based on Dependences among Patterns. Yuki Shiroma, Hironori Washizaki, Yoshiaki Fukazawa, Atsuto Kubo, Nobukazu Yoshioka |
| 2010 | Multi-dimensional Uncertainty Analysis in Secure and Dependable Domain. Yudistira Asnar, Paolo Giorgini |
| 2010 | Multiple Designated Verifiers Signatures Reconsidered. Mebae Ushida, Tetsuya Izu, Masahiko Takenaka, Kazuo Ohta |
| 2010 | On the Simulation of a Software Reputation System. Martin Boldt, Anton Borg, Bengt Carlsson |
| 2010 | One Size Fits None: The Importance of Detector Parameterization. Natasha Bodorik, Nur Zincir-Heywood |
| 2010 | Optimising IDS Sensor Placement. Hao Chen, John A. Clark, Siraj A. Shaikh, Howard Chivers, Philip Nobles |
| 2010 | Owner-Based Role-Based Access Control OB-RBAC. Mohsen Saffarian, Babak Sadighi |
| 2010 | Patterns for Secure Boot and Secure Storage in Computer Systems. Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
| 2010 | Pitfalls in Formal Reasoning about Security Protocols. Nina Moebius, Kurt Stenzel, Wolfgang Reif |
| 2010 | Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach. Simon Tjoa, Stefan Jakoubi, Sigrun Goluch, Gerhard Kitzler |
| 2010 | Practical Experience Gained from Modeling Security Goals: Using SGITs in an Industrial Project. Christian Jung, Frank Elberzhager, Alessandra Bagnato, Fabio Raiteri |
| 2010 | Program Obfuscation by Strong Cryptography. Zeljko Vrba, Pål Halvorsen, Carsten Griwodz |
| 2010 | Quantum Detection of Wavelength Division Multiplexing Optical Coherent Signals in Lossy Channels. Atsushi Waseda, Masahide Sasaki, Masahiro Takeoka, Mikio Fujiwara, Morio Toyoshima, Hidema Tanaka |
| 2010 | Recovery of Skype Application Activity Data from Physical Memory. Matthew Simon, Jill Slay |
| 2010 | Refining the Pattern-Based Reference Model for Electronic Invoices by Incorporating Threats. Michael Netter, Eduardo B. Fernández, Günther Pernul |
| 2010 | Rejuvenating High Available Virtualized Systems. Arash Rezaei, Mohsen Sharifi |
| 2010 | Reselling Digital Content. Laila El Aimani, Yona Raekow |
| 2010 | Risk-Based Methodology for Real-Time Security Monitoring of Interdependent Services in Critical Infrastructures. Jocelyn Aubert, Thomas Schaberreiter, Christophe Incoul, Djamel Khadraoui, Benjamin Gâteau |
| 2010 | Secure Bindings of SAML Assertions to TLS Sessions. Florian Kohlar, Jörg Schwenk, Meiko Jensen, Sebastian Gajek |
| 2010 | Secure Group Communication Using Fractional Public Keys. Sigurd Eskeland, Vladimir A. Oleshchuk |
| 2010 | Secure Monitoring of Service Level Agreements. Kassidy P. Clark, Martijn Warnier, Frances M. T. Brazier, Thomas B. Quillinan |
| 2010 | Secured Key Distribution Scheme for Cryptographic Key Management System. Kyawt Kyawt Khaing, Khin Mi Mi Aung |
| 2010 | Security Modeling and Tool Support Advantages. Egil Trygve Baadshaug, Gencer Erdogan, Per Håkon Meland |
| 2010 | Security and Performance Aspects of an Agent-Based Link-Layer Vulnerability Discovery Mechanism. Ziyad S. Al-Salloum, Stephen D. Wolthusen |
| 2010 | Security and Usability: Analysis and Evaluation. Ronald Kainda, Ivan Flechais, A. W. Roscoe |
| 2010 | Solving the Transitive Access Problem for the Services Oriented Architecture. Alan H. Karp, Jun Li |
| 2010 | Strategies for Reducing Risks of Inconsistencies in Access Control Policies. Bernard Stepien, Stan Matwin, Amy P. Felty |
| 2010 | Supporting Authorization Policy Modification in Agile Development of Web Applications. Steffen Bartsch |
| 2010 | The 'Explore, Investigate and Correlate' (EIC) Conceptual Framework for Digital Forensics Information Visualisation. Grant Osborne, Benjamin P. Turnbull, Jill Slay |
| 2010 | The Road to Hell is Paved with Good Intentions: A Story of (In)secure Software Development. Richard Sasson, Martin Gilje Jaatun, Jostein Jensen |
| 2010 | Threat- and Risk-Analysis During Early Security Requirements Engineering. Holger Schmidt |
| 2010 | Towards a Privacy-Enhanced Social Networking Site. Esma Aïmeur, Sébastien Gambs, Ai Ho |
| 2010 | Towards an Ontology-Based Solution for Managing License Agreement Using Semantic Desktop. Mansoor Ahmed, Amin Anjomshoaa, Muhammad Asfand-e-yar, A Min Tjoa, Abid Khan |
| 2010 | Trust Based Multi Path DSR Protocol. Poonam Gera, Kumkum Garg, Manoj Misra |
| 2010 | Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. Byoungcheon Lee |
| 2010 | Using Normalized Compression Distance for Classifying File Fragments. Stefan Axelsson |
| 2010 | Using Smart Cards for Tamper-Proof Timestamps on Untrusted Clients. Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka |
| 2010 | Visualizing Past Personal Data Disclosures. Jan Paul Kolter, Michael Netter, Günther Pernul |
| 2010 | Zone Based Systems Design Framework for the Realisation of Efficient Block Cipher Based Message Authentication Code Algorithms. A. A. Adekunle, S. R. Woodhead |