| 2014 | A Comparative Study of Control Charts for Zero-Inflated Binomial Processes. Athanasios C. Rakitzis, Petros E. Maravelakis, Philippe Castagliola |
| 2014 | A Formal Model and Analysis of the MQ Telemetry Transport Protocol. Benjamin Aziz |
| 2014 | A Model-Based Security Toolkit for the Internet of Things. Ricardo Neisse, Igor Nai Fovino, Gianmarco Baldini, Vera Stavroulaki, Panagiotis Vlacheas, Raffaele Giaffreda |
| 2014 | A New Access Control Scheme for Facebook-Style Social Networks. Jun Pang, Yang Zhang |
| 2014 | A Proposal for a Unified Identity Card for Use in an Academic Federation Environment. Felipe Coral Sasso, Ricardo Alexandre Reinaldo De Moraes, Jean Everson Martina |
| 2014 | A Relative Cost-Benefit Approach for Evaluating Alternative Airport Security Policies. Woohyun Shim, Fabio Massacci, Alessandra Tedeschi, Alessandro Pollini |
| 2014 | A Resource-Optimized Approach to Efficient Early Detection of Mobile Malware. Jelena Milosevic, Andreas Dittrich, Alberto Ferrante, Miroslaw Malek |
| 2014 | A System for Anonymizing Temporal Phrases of Message Posted in Online Social Networks and for Detecting Disclosure. Hoang-Quoc Nguyen-Son, Minh-Triet Tran, Hiroshi Yoshiura, Noboru Sonehara, Isao Echizen |
| 2014 | A Trust Management Based Security Mechanism against Collusion Attacks in a MANET Environment. Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi |
| 2014 | A Usable Android Application Implementing Distributed Cryptography for Election Authorities. Stephan Neumann, Oksana Kulyk, Melanie Volkamer |
| 2014 | A k-anonymity method based on search engine query statistics for disaster impact statements. Hidenobu Oguri, Noboru Sonehara |
| 2014 | AES-SEC: Improving Software Obfuscation through Hardware-Assistance. Sebastian Schrittwieser, Stefan Katzenbeisser, Georg Merzdovnik, Peter Kieseberg, Edgar R. Weippl |
| 2014 | An Efficient Intrinsic Authorship Verification Scheme Based on Ensemble Learning. Oren Halvani, Martin Steinebach |
| 2014 | An Enhanced Linkable Anonymous Access Protocol of the Distributed Electronic Patient Records. Rima Addas, Ning Zhang |
| 2014 | An Improved Role-Based Access to Android Applications with JCHR. Stefano Bistarelli, Gianpiero Costantino, Fabio Martinelli, Francesco Santini |
| 2014 | Analysis of Algorithms for Computation of Direct Partial Logic Derivatives in Multiple-Valued Decision Diagrams. Jozef Kostolny, Miroslav Kvassay, Elena N. Zaitseva |
| 2014 | BitTorrent Sync: Network Investigation Methodology. Mark Scanlon, Jason Farina, M. Tahar Kechadi |
| 2014 | Building Sustainable Software by Preemptive Architectural Design Using Tactic-Equipped Patterns. Dae-Kyoo Kim, Jungwoo Ryoo, Suntae Kim |
| 2014 | Challenges of Composing XACML Policies. Bernard Stepien, Amy P. Felty, Stan Matwin |
| 2014 | Complete SIP Message Obfuscation: PrivaSIP over Tor. Georgios Karopoulos, Alexandros Fakis, Georgios Kambourakis |
| 2014 | Concurrent Queries in Location Based Services. Emad Elabd, Mohand-Said Hacid |
| 2014 | Continuous and Non-intrusive Reauthentication of Web Sessions Based on Mouse Dynamics. Eric Medvet, Alberto Bartoli, Francesca Boem, Fabiano Tarlao |
| 2014 | Defining Malicious Behavior. Hermann Dornhackl, Konstantin Kadletz, Robert Luh, Paul Tavolato |
| 2014 | Design-In Security for Air Traffic Control. Martin Hawley, Karol Gotz, John Hird, Chris Machin |
| 2014 | Divide-and-Conquer: Why Android Malware Cannot Be Stopped. Dominik Christian Maier, Tilo Müller, Mykola Protsenko |
| 2014 | DroidForce: Enforcing Complex, Data-centric, System-wide Policies in Android. Siegfried Rasthofer, Steven Arzt, Enrico Lovat, Eric Bodden |
| 2014 | EM Leakage of RFID Devices - Comparison of Two Measurement Approaches. Thomas Korak, Thomas Plos |
| 2014 | EMFASE - An Empirical Framework for Security Design and Economic Trade-off. Fabio Massacci, Federica Paci, Bjørnar Solhaug, Alessandra Tedeschi |
| 2014 | Effects of External Information on Anonymity and Role of Transparency with Example of Social Network De-anonymisation. Haruno Kataoka, Yohei Ogawa, Isao Echizen, Tetsuji Kuboyama, Hiroshi Yoshiura |
| 2014 | Efficient Cropping-Resistant Robust Image Hashing. Martin Steinebach, Huajian Liu, York Yannikos |
| 2014 | EmailCloak: A Practical and Flexible Approach to Improve Email Privacy. Italo Dacosta, Andreas Put, Bart De Decker |
| 2014 | Enhanced Configuration Generation Approach for Highly Available COTS Based Systems. Parsa Pourali, Ferhat Khendek, Maria Toeroe |
| 2014 | Evaluating the Effectiveness of ISO 27001: 2013 Based on Annex A. Bahareh Shojaie, Hannes Federrath, Iman Saberi |
| 2014 | Fast Monte Carlo Simulation Methods Adapted to Simple Petri Net Models. Maïder Estecahandy, Stéphane Collas, Laurent Bordes, Christian Paroissin |
| 2014 | Fighting Botnets with Cyber-Security Analytics: Dealing with Heterogeneous Cyber-Security Information in New Generation SIEMs. Beatriz Gallego-Nicasio Crespo, Alan Garwood |
| 2014 | Healthcare Services in the Cloud - Obstacles to Adoption, and a Way Forward. Karin Bernsmed, Daniela S. Cruzes, Martin Gilje Jaatun, Børge Haugset, Erlend Andreas Gjære |
| 2014 | Increasing the Resilience and Trustworthiness of OpenID Identity Providers for Future Networks and Services. Diego Kreutz, Eduardo Feitosa, Hugo Cunha, Heiko Niedermayer, Holger Kinkelin |
| 2014 | Learn to SWIM. Matias Krempel, Martin Gilje Jaatun |
| 2014 | LiSTT: An Investigation into Unsound-Incomplete Yet Practical Result Yielding Static Taintflow Analysis. Sanjay Rawat, Laurent Mounier, Marie-Laure Potet |
| 2014 | Lobotomy: An Architecture for JIT Spraying Mitigation. Martin Jauernig, Matthias Neugschwandtner, Christian Platzer, Paolo Milani Comparetti |
| 2014 | Mathematical Modelling in Air Traffic Management Security. Denis Kolev, Evgeniy Morozov |
| 2014 | Monte-Carlo Based Reliability Modelling of a Gas Network Using Graph Theory Approach. Pavel Praks, Vytis Kopustinskas |
| 2014 | Network Security Analysis Using Behavior History Graph. Mirko Sailio, Matti Mantere, Sami Noponen |
| 2014 | Network Security Monitoring in a Small-Scale Smart-Grid Laboratory. Matti Mantere, Sami Noponen, Pia Olli, Jarno Salonen |
| 2014 | Ninth International Conference on Availability, Reliability and Security, ARES 2014, Fribourg, Switzerland, September 8-12, 2014 |
| 2014 | No Smurfs: Revealing Fraud Chains in Mobile Money Transfers. Maria Zhdanova, Jürgen Repp, Roland Rieke, Chrystel Gaber, Baptiste Hemery |
| 2014 | On Availability Comparison of Reservation Modes for Multi-state Air Conditioning Systems Using Markov Approach. Lev Khvatskin, Ilia Frenkel |
| 2014 | On Sensitivity of Reliability Models to the Shape of Life and Repair Time Distributions. Vladimir Rykov, Dmitry Efrosinin, Vladimir M. Vishnevskiy |
| 2014 | Optimizing the Availability and the Operational Cost of a Periodically Inspected Multi-state Deteriorating System with Condition Based Maintenance Policies. Sonia Malefaki, Vasilis P. Koutras, Agapios N. Platis |
| 2014 | Organizing On-Site Volunteers: An App-Based Approach. Stefan Sackmann, Marlen Hofmann, Hans Betke |
| 2014 | Palpable Privacy through Declarative Information Flows Tracking for Smart Buildings. François Lesueur, Sabina Surdu, Romuald Thion, Yann Gripay, Meriam Ben-Ghorbel-Talbi |
| 2014 | Performance Determination for MSS Manufacturing System by Lz-Transform and Stochastic Processes Approach. Ilia Frenkel, Svetlana Daichman, Lev Khvatskin, Neta Avraham, Oshrit Zihry, Anatoly Lisnianski |
| 2014 | Performance Measures of Behavior-Based Signatures: An Anti-malware Solution for Platforms with Limited Computing Resource. Kelly Hughes, Yanzhen Qu |
| 2014 | PhiGARo: Automatic Phishing Detection and Incident Response Framework. Martin Husák, Jakub Cegan |
| 2014 | Phishdentity: Leverage Website Favicon to Offset Polymorphic Phishing Website. Jeffrey Choo Soon Fatt, Kang-Leng Chiew, San-Nah Sze |
| 2014 | Practical Applications of Advanced Statistical Models in Reliability Data Analysis. Vasiliy V. Krivtsov, Olexandr Yevkin |
| 2014 | Practical Attack on Bilinear Pairings to Disclose the Secrets of Embedded Devices. Thomas Unterluggauer, Erich Wenger |
| 2014 | Privacy Dashboards: Reconciling Data-Driven Business Models and Privacy. Christian Zimmermann, Rafael Accorsi, Günter Müller |
| 2014 | Privacy Preservation in Location-Based Mobile Applications: Research Directions. Asma Patel, Esther Palomar |
| 2014 | Qualified Electronic Signature via SIM Card Using JavaCard 3 Connected Edition Platform. Jakub Breier, Adam Pomothy |
| 2014 | Quality Matters: Systematizing Quality Deficiencies in the Documentation of Business Security Requirements. Christian Sillaber, Ruth Breu |
| 2014 | Real-Time Screen Watermarking Using Overlaying Layer. Maciej Piec, Andreas Rauber |
| 2014 | Rethread: A Low-Cost Transient Fault Recovery Scheme for Multithreaded Processors. Jian Fu, Qiang Yang, Raphael Poss, Chris R. Jesshope, Chunyuan Zhang |
| 2014 | Risk-Aware Design and Management of Resilient Networks. Piotr Cholda |
| 2014 | Security Situation Management: Towards Developing a Time-Critical Decision Making Capability for SESAR. Rainer Koelle |
| 2014 | Semi-Markov Modelling for Multi-state Systems. Vlad Stefan Barbu, Alex Karagrigoriou, Andreas Makrides |
| 2014 | Statistical Inference for Heavy-Tailed Distributions in Technical Systems. Alex Karagrigoriou, Ilia Vonta |
| 2014 | Stochastic Model for Medical Image Segmentation. Zeev Barzily, Mingyue Ding, Zeev Volkovich |
| 2014 | Supporting Security Automation for Multi-chassis Link Aggregation Groups via the Interconnected-Asset Ontology. Henk Birkholz, Ingo Sieverdingbeck |
| 2014 | The SMM Rootkit Revisited: Fun with USB. Joshua Schiffman, David Kaplan |
| 2014 | The Social Acceptance of the Passivation of Misused Aircraft. Ana P. G. Martins |
| 2014 | Towards a Hardware Trojan Detection Cycle. Adrian Dabrowski, Heidelinde Hobel, Johanna Ullrich, Katharina Krombholz, Edgar R. Weippl |
| 2014 | Using Assurance Cases to Develop Iteratively Security Features Using Scrum. Lotfi Ben Othmane, Pelin Angin, Bharat K. Bhargava |
| 2014 | Verifying Implementation of Security Design Patterns Using a Test Template. Masatoshi Yoshizawa, Takanori Kobashi, Hironori Washizaki, Yoshiaki Fukazawa, Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka |
| 2014 | Visualization of Recovery Situation in Disaster Area by Using Web Reservation Data. Yu Ichifuji, Noboru Sonehara |
| 2014 | Visualization of Security Metrics for Cyber Situation Awareness. Igor V. Kotenko, Evgenia Novikova |
| 2014 | Visualizing Transaction Context in Trust and Reputation Systems. Johannes Sänger, Günther Pernul |
| 2014 | Vulnerability-Based Security Pattern Categorization in Search of Missing Patterns. Priya Anand, Jungwoo Ryoo, Rick Kazman |
| 2014 | What Does the Fox Say? On the Security Architecture of Firefox OS. Marta Piekarska, Bhargava Shastry, Ravishankar Borgaonkar |