| 2013 | 2013 International Conference on Availability, Reliability and Security, ARES 2013, Regensburg, Germany, September 2-6, 2013 |
| 2013 | A Bootstrapping Approach for Developing a Cyber-security Ontology Using Textbook Index Terms. Arwa M. Wali, Soon Ae Chun, James Geller |
| 2013 | A Classifier of Malicious Android Applications. Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio |
| 2013 | A Comprehensive Literature Review of File Carving. Rainer Poisel, Simon Tjoa |
| 2013 | A Generation Method of Cryptographic Keys for Enterprise Communication Systems. Aleksandar Hudic, Elise Revell, Dimitris E. Simos |
| 2013 | A Genetic Algorithm Approach for the Most Likely Attack Path Problem. Mohammed A. Alhomidi, Martin J. Reed |
| 2013 | A Grammatical Inference Approach to Language-Based Anomaly Detection in XML. Harald Lampesberger |
| 2013 | A Novel Proximity Based Trust Model for Opportunistic Networks. Mai H. El-Sherief, Marianne A. Azer |
| 2013 | A PEP-PDP Architecture to Monitor and Enforce Security Policies in Java Applications. Yehia Elrakaiby, Yves Le Traon |
| 2013 | A Privacy-Preserving Entropy-Driven Framework for Tracing DoS Attacks in VoIP. Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Angelos D. Keromytis |
| 2013 | A Problem-Based Threat Analysis in Compliance with Common Criteria. Kristian Beckers, Denis Hatebur, Maritta Heisel |
| 2013 | A Reference Model of Information Assurance & Security. Yulia Cherdantseva, Jeremy Hilton |
| 2013 | A Reputation-Based Clustering Mechanism for MANET Routing Security. Aida Ben Chehida, Ryma Abassi, Sihem Guemara El Fatmi |
| 2013 | A Scalable SIEM Correlation Engine and Its Application to the Olympic Games IT Infrastructure. Valerio Vianello, Vincenzo Gulisano, Ricardo Jiménez-Peris, Marta Patiño-Martínez, Rubén Torres, Rodrigo Diaz, Elsa Prieto |
| 2013 | A Statistical Approach for Fingerprinting Probing Activities. Elias Bou-Harb, Mourad Debbabi, Chadi Assi |
| 2013 | A Usability Evaluation of the NESSoS Common Body of Knowledge. Kristian Beckers, Maritta Heisel |
| 2013 | ANANAS - A Framework for Analyzing Android Applications. Thomas Eder, Michael Rodler, Dieter Vymazal, Markus Zeilinger |
| 2013 | ARGUS 3D: Security Enhancements through Innovative Radar Technologies. Roberta Cardinali, Enrico Anniballi, Carlo Bongioanni, Antonio Macera, Fabiola Colone, Pierfrancesco Lombardo |
| 2013 | ARMORED: CPU-Bound Encryption for Android-Driven ARM Devices. Johannes Götzfried, Tilo Müller |
| 2013 | Addressing Security Issues of Electronic Health Record Systems through Enhanced SIEM Technology. Cesario Di Sarno, Valerio Formicola, Mario Sicuranza, Giovanni Paragliola |
| 2013 | An Analysis and Evaluation of Security Aspects in the Business Process Model and Notation. Maria Leitner, Michelle Miller, Stefanie Rinderle-Ma |
| 2013 | An Approach Based on Model-Driven Engineering to Define Security Policies Using OrBAC. Denisse Muñante, Laurent Gallon, Philippe Aniorté |
| 2013 | An Ontology for Malware Analysis. David A. Mundie, David M. McIntire |
| 2013 | Anonymizing Face Images by Using Similarity-Based Metric. Tomoya Muraki, Shintaro Oishi, Masatsugu Ichino, Isao Echizen, Hiroshi Yoshiura |
| 2013 | Applying the SecRAM Methodology in a CLOUD-Based ATM Environment. Antonio Marotta, Gabriella Carrozza, Luigi Battaglia, Patrizia Montefusco, Vittorio Manetti |
| 2013 | Artificial Aging of Mobile Devices Using a Simulated GSM/GPRS Network. Rolf Stobe, Hans Höfken, Marko Schuba, Michael Breuer |
| 2013 | Assessing Water Cooling System Performance: Lz-Transform Method. Ilia Frenkel, Lev Khvatskin, Svetlana Daichman, Anatoly Lisnianski |
| 2013 | Automated Synthesis and Ranking of Secure BPMN Orchestrators. Vincenzo Ciancia, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, José Antonio Martín, Ernesto Pimentel |
| 2013 | Beyond Traceability: Compared Approaches to Consistent Security Risk Assessments. Franco Bergomi, Stéphane Paul, Bjørnar Solhaug, Raphaël Vignon-Davillier |
| 2013 | Collaborative Security Management: Developing Ideas in Security Management for Air Traffic Control. Martin Hawley, Paul Howard, Rainer Koelle, Peter Saxton |
| 2013 | Collaboratively Exchanging Warning Messages between Peers While under Attack. Mirko Haustein, Herbert Sighart, Dennis Titze, Peter Schoo |
| 2013 | Conflict Management in Obligation with Deadline Policies. Nada Essaouini, Frédéric Cuppens, Nora Cuppens-Boulahia, Anas Abou El Kalam |
| 2013 | Counteract DNS Attacks on SIP Proxies Using Bloom Filters. Ge Zhang, Simone Fischer-Hübner |
| 2013 | Cuteforce Analyzer: A Distributed Bruteforce Attack on PDF Encryption with GPUs and FPGAs. Bianca Danczul, Jürgen Fuß, Stefan Gradinger, Bernhard Greslehner, Wolfgang Kastl, Florian Wex |
| 2013 | DNSSEC: Interoperability Challenges and Transition Mechanisms. Amir Herzberg, Haya Schulmann |
| 2013 | Detecting Insider Threats: A Trust-Aware Framework. Federica Paci, M. Carmen Fernández Gago, Francisco Moyano |
| 2013 | Detection of Hidden Fraudulent URLs within Trusted Sites Using Lexical Features. Enrico Sorio, Alberto Bartoli, Eric Medvet |
| 2013 | Dynamic Certification of Cloud Services. Iryna Windhorst, Ali Sunyaev |
| 2013 | Enhancing CHASSIS: A Method for Combining Safety and Security. Christian Raspotnig, Vikash Katta, Péter Kárpáti, Andreas L. Opdahl |
| 2013 | Enhancing Security Testing via Automated Replication of IT-Asset Topologies. Henk Birkholz, Ingo Sieverdingbeck, Nicolai Kuntze, Carsten Rudolph |
| 2013 | Estimating Software Vulnerabilities: A Case Study Based on the Misclassification of Bugs in MySQL Server. Jason L. Wright, Jason W. Larsen, Miles McQueen |
| 2013 | Estimating the Value of Personal Information with SNS Utility. Memiko Otsuki, Noboru Sonehara |
| 2013 | Evaluation of Airport Security Training Programs: Perspectives and Issues. Woohyun Shim, Fabio Massacci, Martina de Gramatica, Alessandra Tedeschi, Alessandro Pollini |
| 2013 | Experiences and Challenges in Enhancing Security Information and Event Management Capability Using Unsupervised Anomaly Detection. Stefan Asanger, Andrew Hutchison |
| 2013 | FASTDD: An Open Source Forensic Imaging Tool. Paolo Bertasi, Nicola Zago |
| 2013 | Federated Identity Management and Usage Control - Obstacles to Industry Adoption. Jostein Jensen, Åsmund Ahlmann Nyre |
| 2013 | Fraud Detection in Mobile Payments Utilizing Process Behavior Analysis. Roland Rieke, Maria Zhdanova, Jürgen Repp, Romain Giot, Chrystel Gaber |
| 2013 | GVScan: Scanning Networks for Global Vulnerabilities. Fabrizio Baiardi, Fabio Corò, Federico Tonelli, Luca Guidi |
| 2013 | Genetic Algorithm and Data Mining Techniques for Design Selection in Databases. Christos Koukouvinos, Christina Parpoula, Dimitris E. Simos |
| 2013 | Hiding Privacy Leaks in Android Applications Using Low-Attention Raising Covert Channels. Jean-François Lalande, Steffen Wendzel |
| 2013 | High Availability for IPsec VPN Platforms: ClusterIP Evaluation. Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent |
| 2013 | ICHIGAN Security - A Security Architecture That Enables Situation-Based Policy Switching. Hiroshi Maruyama, Kiyoshi Watanabe, Sachiko Yoshihama, Naohiko Uramoto, Yoichiro Takehora, Kazuhiro Minami |
| 2013 | IT Service Continuity: Achieving Embeddedness through Planning. Marko Niemimaa, Jonna Järveläinen |
| 2013 | Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment. Aaron Paulos, Partha P. Pal, Richard E. Schantz, Brett Benyo, David Johnson, Mike Hibler, Eric Eide |
| 2013 | Laribus: Privacy-Preserving Detection of Fake SSL Certificates with a Social P2P Notary Network. Andrea Micheloni, Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath |
| 2013 | Limiting MitM to MitE Covert-Channels. Amir Herzberg, Haya Schulmann |
| 2013 | Measuring Anonymity with Plausibilistic Entropy. I. Goriac |
| 2013 | Minimizing the Costs of Side-Channel Analysis Resistance Evaluations in Early Design Steps. Thomas Korak, Thomas Plos, Andreas Zankl |
| 2013 | Model-Assisted Access Control Implementation for Code-centric Ruby-on-Rails Web Application Development. Seiji Munetoh, Nobukazu Yoshioka |
| 2013 | Model-Based Generation of Synthetic Disk Images for Digital Forensic Tool Testing. York Yannikos, Christian Winter |
| 2013 | Modelling and Analysis of Release Order of Security Algorithms Using Stochastic Petri Nets. Suliman A. Alsuhibany, Aad P. A. van Moorsel |
| 2013 | On Secure Multi-party Computation in Bandwidth-Limited Smart-Meter Systems. Mario Kirschbaum, Thomas Plos, Jörn-Marc Schmidt |
| 2013 | On Selecting Critical Security Controls. Jakub Breier, Ladislav Hudec |
| 2013 | On the Practicability of Cold Boot Attacks. Michael Gruhn, Tilo Müller |
| 2013 | Organizational Security Architecture for Critical Infrastructure. Jonathan Blangenois, Guy Guemkam, Christophe Feltus, Djamel Khadraoui |
| 2013 | Overview of Recent Advances in CCTV Processing Chain in the INDECT and INSIGMA Projects. Andrzej Dziech, Jaroslaw Bialas, Andrzej Glowacz, Pawel Korus, Mikolaj Leszczuk, Andrzej Matiolanski, Remigiusz Baran |
| 2013 | Pretty Understandable Democracy - A Secure and Understandable Internet Voting Scheme. Jurlind Budurushi, Stephan Neumann, Maina M. Olembo, Melanie Volkamer |
| 2013 | Privacy Panel: Usable and Quantifiable Mobile Privacy. Debmalya Biswas, Imad Aad, Gian Paolo Perrucci |
| 2013 | Privacy-Preserving Publishing of Pseudonym-Based Trajectory Location Data Set. Ken Mano, Kazuhiro Minami, Hiroshi Maruyama |
| 2013 | Probabilistic Contract Compliance for Mobile Applications. Gianluca Dini, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra |
| 2013 | PyTrigger: A System to Trigger & Extract User-Activated Malware Behavior. Dan Fleck, Arnur G. Tokhtabayev, Alex Alarif, Angelos Stavrou, Tomas Nykodym |
| 2013 | Reconsidering Intrusion Monitoring Requirements in Shared Cloud Platforms. Kahina Lazri, Sylvie Laniepce, Jalel Ben-Othman |
| 2013 | Reliability Prediction for Component-Based Software Systems with Architectural-Level Fault Tolerance Mechanisms. Thanh-Trung Pham, Xavier Défago |
| 2013 | Reputation-Controlled Business Process Workflows. Benjamin Aziz, Geoff W. Hamilton |
| 2013 | Requirements Management in a Combined Process for Safety and Security Assessments. Vikash Katta, Christian Raspotnig, Péter Kárpáti, Tor Stålhane |
| 2013 | Resource Pool Oriented Trust Management for Cloud Infrastructure. Gansen Zhao, Haiyu Wang, Chunming Rong, Yong Tang |
| 2013 | Revisiting Circuit Clogging Attacks on Tor. Eric Chan-Tin, Jiyoung Shin, Jiangmin Yu |
| 2013 | Run-Time Risk Management in Adaptive ICT Systems. Mike Surridge, Bassem I. Nasser, Xiaoyu Chen, Ajay Chakravarthy, Panos Melas |
| 2013 | SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting. Thomas Unger, Martin Mulazzani, Dominik Fruhwirt, Markus Huber, Sebastian Schrittwieser, Edgar R. Weippl |
| 2013 | Scope of Security Properties of Sanitizable Signatures Revisited. Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin |
| 2013 | Secure Engineering and Modelling of a Metering Devices System. José Fran. Ruiz, Marcos Arjona, Antonio Mana, Niklas Carstens |
| 2013 | Secure Profile Provisioning Architecture for Embedded UICC. Jaemin Park, Kiyoung Baek, Cheoloh Kang |
| 2013 | Security Blind Spots in the ATM Safety Culture. Howard Chivers, John Hird |
| 2013 | Shared Crowds: A Token-Ring Approach to Hide the Receiver. Raphael Wigoutschnigg, Peter Schartner, Stefan Rass |
| 2013 | Sink or SWIM: Information Security Requirements in the Sky. Martin Gilje Jaatun, Tor Erlend Fægri |
| 2013 | Social Issues of Big Data and Cloud: Privacy, Confidentiality, and Public Utility. Koichiro Hayashi |
| 2013 | Software Vulnerability Detection Using Backward Trace Analysis and Symbolic Execution. Hongzhe Li, Taebeom Kim, Munkhbayar Bat-Erdene, Heejo Lee |
| 2013 | Some General Properties of Multi-state Physical Models. Paolo Rocchi, Gurami Tsitsiashvili |
| 2013 | Statistical Inference for Multi-state Systems: The Weibull Case. Andreas Makrides, Alex Karagrigoriou |
| 2013 | Structured Pattern-Based Security Requirements Elicitation for Clouds. Kristian Beckers, Maritta Heisel, Isabelle Côté, Ludger Goeke, Selim Güler |
| 2013 | TRESCCA - Trustworthy Embedded Systems for Secure Cloud Computing. Gunnar Schomaker, Andreas Herrholz, Guillaume Duc, Renaud Pacalet, Salvatore Raho, Miltos D. Grammatikakis, Marcello Coppola, Ignacio Garcia Vega |
| 2013 | Taxonomy for Port Security Systems. Tove Gustavi, Pontus Svenson |
| 2013 | Taxonomy for Social Network Data Types from the Viewpoint of Privacy and User Control. Christian Richthammer, Michael Netter, Moritz Riesner, Günther Pernul |
| 2013 | The Big Four - What We Did Wrong in Advanced Persistent Threat Detection? Nikos Virvilis, Dimitris Gritzalis |
| 2013 | The Common Limes Security Model for Asset Flow Control in Decentralized, Insecure Systems. Eckehard Hermann, Rüdiger Grimm |
| 2013 | The Ontology of Metrics for Security Evaluation and Decision Support in SIEM Systems. Igor V. Kotenko, Olga Polubelova, Igor Saenko, Elena Doynikova |
| 2013 | The Scourge of Internet Personal Data Collection. Esma Aïmeur, Manuel Lafond |
| 2013 | The Transitivity-of-Trust Problem in Android Application Interaction. Steffen Bartsch, Bernhard J. Berger, Michaela Bunke, Karsten Sohr |
| 2013 | The Trusted Attribute Aggregation Service (TAAS) - Providing an Attribute Aggregation Layer for Federated Identity Management. David W. Chadwick, George Inman |
| 2013 | The Use and Usefulness of Threats in Goal-Oriented Modelling. Per Håkon Meland, Erlend Andreas Gjære, Stéphane Paul |
| 2013 | Towards Harmonising the Legislative, Regulatory, and Standards-Based Framework for ATM Security: Developing a Software Support Tool. Rainer Koelle, Walter Strijland, Stefan Roels |
| 2013 | Towards Web-Based Biometric Systems Using Personal Browsing Interests. Lukasz Olejnik, Claude Castelluccia |
| 2013 | Towards a Risk Based Assessment of QoS Degradation for Critical Infrastructure. Moussa Ouedraogo, Manel Khodja, Djamel Khadraoui |
| 2013 | Towards an Ontology for Cloud Security Obligations. Karin Bernsmed, Astrid Undheim, Per Håkon Meland, Martin Gilje Jaatun |
| 2013 | Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures. Zeeshan Bilal, Keith Martin |
| 2013 | Universal Peer-to-Peer Network Investigation Framework. Mark Scanlon, M. Tahar Kechadi |
| 2013 | User Interface Harmonization for IT Security Management: User-Centered Design in the PoSecCo Project. Beatriz Gallego-Nicasio Crespo |
| 2013 | Using Twitter's Mentions for Efficient Emergency Message Propagation. Kelly Y. Itakura, Noboru Sonehara |
| 2013 | Validating Security Design Patterns Application Using Model Testing. Takanori Kobashi, Nobukazu Yoshioka, Takao Okubo, Haruhiko Kaiya, Hironori Washizaki, Yoshiaki Fukazawa |
| 2013 | iOS Forensics: How Can We Recover Deleted Image Files with Timestamp in a Forensically Sound Manner? Aswami Ariffin, Christian D'Orazio, Kim-Kwang Raymond Choo, Jill Slay |