| 2015 | 0-Day Vulnerabilities and Cybercrime. Jart Armin, Paolo Foti, Marco Cremonini |
| 2015 | 10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015 |
| 2015 | 2020 Cybercrime Economic Costs: No Measure No Solution. Jart Armin, Bryn Thompson, Davide Ariu, Giorgio Giacinto, Fabio Roli, Piotr Kijewski |
| 2015 | A Framework for the Discovery, Analysis, and Retrieval of Multimedia Homemade Explosives Information on the Web. Theodora Tsikrika, George Kalpakis, Stefanos Vrochidis, Ioannis Kompatsiaris, Iraklis Paraskakis, Isaak Kavasidis, Jonathan Middleton, Una Williamson |
| 2015 | A JPEG-Compression Resistant Adaptive Steganography Based on Relative Relationship between DCT Coefficients. Yi Zhang, Xiangyang Luo, Chunfang Yang, Dengpan Ye, Fenlin Liu |
| 2015 | A Landmark Calibration Based IP Geolocation Approach. Jingning Chen, Fenlin Liu, Xiangyang Luo, Fan Zhao, Guang Zhu |
| 2015 | A Lightweight Framework for Cold Boot Based Forensics on Mobile Devices. Benjamin Taubmann, Manuel Huber, Sascha Wessel, Lukas Heim, Hans Peter Reiser, Georg Sigl |
| 2015 | A Model Implementing Certified Reputation and Its Application to TripAdvisor. Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera |
| 2015 | A Model for Specification and Validation of a Trust Management Based Security Scheme in a MANET Environment. Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi |
| 2015 | A Novel Security-Enhanced Agile Software Development Process Applied in an Industrial Setting. Dejan Baca, Martin Boldt, Bengt Carlsson, Andreas Jacobsson |
| 2015 | A Performance Evaluation of Hash Functions for IP Reputation Lookup Using Bloom Filters. Marc Antoine Gosselin-Lavigne, Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani |
| 2015 | A Secure Integrated Platform for Rapdily Formed Multiorganisation Collaborations. John Zic, Nerolie Oakes, Dongxi Liu, Jane Li, Chen Wang, Shiping Chen |
| 2015 | A Time Series Approach for Inferring Orchestrated Probing Campaigns by Analyzing Darknet Traffic. Elias Bou-Harb, Mourad Debbabi, Chadi Assi |
| 2015 | Accountable Redactable Signatures. Henrich Christopher Pöhls, Kai Samelin |
| 2015 | Advanced Attribute-Based Key Management for Mobile Devices in Hybrid Clouds. Jaemin Park, Eunchan Kim, Sungjin Park, Cheoloh Kang |
| 2015 | Advanced Identity and Access Policy Management Using Contextual Data. Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs, Günther Pernul |
| 2015 | All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks. Quoc-Sang Phan, Pasquale Malacaria |
| 2015 | An Active Testing Tool for Security Testing of Distributed Systems. Mohamed H. E. Aouadi, Khalifa Toumi, Ana R. Cavalli |
| 2015 | An Empirical Study of Click Fraud in Mobile Advertising Networks. Geumhwan Cho, Junsung Cho, Youngbae Song, Hyoungshick Kim |
| 2015 | An Open Source Code Analyzer and Reviewer (OSCAR) Framework. Simon Tjoa, Patrick Kochberger, Christoph Malin, Andreas Schmoll |
| 2015 | AnonCall: Making Anonymous Cellular Phone Calls. Eric Chan-Tin |
| 2015 | Behavioural Evidence Analysis Applied to Digital Forensics: An Empirical Analysis of Child Pornography Cases Using P2P Networks. Noora Al Mutawa, Joanne Bryce, Virginia N. L. Franqueira, Andrew Marrington |
| 2015 | Challenges of Data Provenance for Cloud Forensic Investigations. Victoria M. Katilu, Virginia N. L. Franqueira, Olga Angelopoulou |
| 2015 | Cold Boot Attacks on DDR2 and DDR3 SDRAM. Simon Lindenlauf, Hans Höfken, Marko Schuba |
| 2015 | Color Image Stegananalysis Using Correlations between RGB Channels. Hasan Abdulrahman, Marc Chaumont, Philippe Montesinos, Baptiste Magnier |
| 2015 | Complexity Estimates of a SHA-1 Near-Collision Attack for GPU and FPGA. Jürgen Fuß, Stefan Gradinger, Bernhard Greslehner-Nimmervoll, Robert Kolmhofer |
| 2015 | Composition-Malware: Building Android Malware at Run Time. Gerardo Canfora, Francesco Mercaldo, Giovanni Moriano, Corrado Aaron Visaggio |
| 2015 | Comprehensive Approach to Increase Cyber Security and Resilience. Michal Choras, Rafal Kozik, Maria Pilar Torres Bruna, Artsiom Yautsiukhin, Andrew Churchill, Iwona Maciejewska, Irene Eguinoa, Adel Jomni |
| 2015 | Concept Detection in Multimedia Web Resources About Home Made Explosives. George Kalpakis, Theodora Tsikrika, Fotini Markatopoulou, Nikiforos Pittaras, Stefanos Vrochidis, Vasileios Mezaris, Ioannis Patras, Ioannis Kompatsiaris |
| 2015 | Countermeasures for Covert Channel-Internal Control Protocols. Jaspreet Kaur, Steffen Wendzel, Michael Meier |
| 2015 | Cross-Domain Attribute Conversion for Authentication and Authorization. Stefan Thaler, Jerry den Hartog, Dhouha Ayed, Dieter Sommer, Michael Hitchens |
| 2015 | Deploying Honeypots and Honeynets: Issue of Privacy. Pavol Sokol, Martin Husák, Frantiek Liptak |
| 2015 | Don't Brick Your Car: Firmware Confidentiality and Rollback for Vehicles. Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes |
| 2015 | Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code. Mykola Protsenko, Sebastien Kreuter, Tilo Müller |
| 2015 | Effectiveness of Opcode ngrams for Detection of Multi Family Android Malware. Gerardo Canfora, Andrea De Lorenzo, Eric Medvet, Francesco Mercaldo, Corrado Aaron Visaggio |
| 2015 | Efficiency Evaluation of Cryptographic Protocols for Boardroom Voting. Oksana Kulyk, Stephan Neumann, Jurlind Budurushi, Melanie Volkamer, Rolf Haenni, Reto E. Koenig, Philémon von Bergen |
| 2015 | Empirical Evaluation of the A3 Environment: Evaluating Defenses Against Zero-Day Attacks. Shane S. Clark, Aaron Paulos, Brett Benyo, Partha P. Pal, Richard E. Schantz |
| 2015 | Enabling Constraints and Dynamic Preventive Access Control Policy Enforcement in the Cloud. Somchart Fugkeaw, Hiroyuki Sato |
| 2015 | Error/Intrusion Target Identification on the Physical Layer over a BICM Scheme. Sihem Châabouni, Amel Meddeb-Makhlouf |
| 2015 | Evaluation of a Sector-Hash Based Rapid File Detection Method for Monitoring Infrastructure-as-a-Service Cloud Platforms. Manabu Hirano, Hayate Takase, Koki Yoshida |
| 2015 | Event Prediction with Community Leaders. Jun Pang, Yang Zhang |
| 2015 | Fair Fingerprinting Protocol for Attesting Software Misuses. Raphael C. S. Machado, Davidson R. Boccardo, Vinícius Gusmão Pereira de Sá, Jayme Luiz Szwarcfiter |
| 2015 | Generation of Local and Expected Behaviors of a Smart Card Application to Detect Software Anomaly. Germain Jolly, Baptiste Hemery, Christophe Rosenberger |
| 2015 | Gradually Improving the Forensic Process. Sebastian Neuner, Martin Mulazzani, Sebastian Schrittwieser, Edgar R. Weippl |
| 2015 | Hardware Security Evaluation Using Assurance Case Models. Henrique Kawakami, Roberto Gallo, Ricardo Dahab, Erick Nascimento |
| 2015 | How Much Cloud Can You Handle? Martin Gilje Jaatun, Inger Anne Tøndel |
| 2015 | Image Watermarking with Biometric Data for Copyright Protection. Morgan Barbier, Jean-Marie Le Bars, Christophe Rosenberger |
| 2015 | Impacts of Tourist Accommodations as Temporal Shelter on Evacuee Overflow for the Reassignment of Shelters Jurisdiction. Yu Ichifuji, Noriaki Koide, Noboru Sonehara |
| 2015 | Incremental Development of RBAC-Controlled E-Marking System Using the B Method. Nasser Al-Hadhrami, Benjamin Aziz, Shantanu Sardesai, Lotfi Ben Othmane |
| 2015 | Independent Security Testing on Agile Software Development: A Case Study in a Software Company. Jesus Choliz, Julian Vilas, José Moreira |
| 2015 | Integrating Human Behavior Into the Development of Future Cyberterrorism Scenarios. Max Kilger |
| 2015 | Intensifying State Surveillance of Electronic Communications: A Legal Solution in Addressing Extremism or Not? Murdoch Watney |
| 2015 | Literature Review of the Challenges of Developing Secure Software Using the Agile Approach. Hela Oueslati, Mohammad Masudur Rahman, Lotfi Ben Othmane |
| 2015 | Malicious Insiders with Ties to the Internet Underground Community. Jason W. Clark, Matt Collins, Jeremy R. Strozer |
| 2015 | Markov Process Based Retrieval for Encrypted JPEG Images. Hang Cheng, Xinpeng Zhang, Jiang Yu, Fengyong Li |
| 2015 | Method Selection and Tailoring for Agile Threat Assessment and Mitigation. Stephan Renatus, Clemens Teichmann, Jörn Eichler |
| 2015 | Modeling Fraud Prevention of Online Services Using Incident Response Trees and Value at Risk. Dan Gorton |
| 2015 | Monitoring and Securing New Functions Deployed in a Virtualized Networking Environment. Bertrand Mathieu, Guillaume Doyen, Wissam Mallouli, Thomas Silverston, Olivier Bettan, François-Xavier Aguessy, Thibault Cholez, Abdelkader Lahmadi, Patrick Truong, Edgardo Montes de Oca |
| 2015 | Network Security Challenges in Android Applications. Damjan Buhov, Markus Huber, Georg Merzdovnik, Edgar R. Weippl, Vesna Dimitrova |
| 2015 | Network-Based HTTPS Client Identification Using SSL/TLS Fingerprinting. Martin Husák, Milan Cermák, Tomás Jirsík, Pavel Celeda |
| 2015 | Nomad: A Framework for Developing Mission-Critical Cloud-Based Applications. Mamadou H. Diallo, Michael August, Roger Hallman, Megan Kline, Henry Au, Vic Beach |
| 2015 | Novel Method of Hiding Information in IP Telephony Using Pitch Approximation. Artur Janicki |
| 2015 | On Reconnaissance with IPv6: A Pattern-Based Scanning Approach. Johanna Ullrich, Peter Kieseberg, Katharina Krombholz, Edgar R. Weippl |
| 2015 | On the Isofunctionality of Network Access Control Lists. Malek Belhaouane, Joaquín García-Alfaro, Hervé Debar |
| 2015 | Optimizing IT Service Costs with Respect to the Availability Service Level Objective. Sascha Bosse, Matthias Splieth, Klaus Turowski |
| 2015 | Overview of the Forensic Investigation of Cloud Services. Jason Farina, Mark Scanlon, Nhien-An Le-Khac, M. Tahar Kechadi |
| 2015 | PALPAS - PAssword Less PAssword Synchronization. Moritz Horsch, Andreas Hülsing, Johannes Buchmann |
| 2015 | PScore: A Framework for Enhancing Privacy Awareness in Online Social Networks. Georgios Petkos, Symeon Papadopoulos, Yiannis Kompatsiaris |
| 2015 | Personal Agent for Services in ITS. Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Tatsuhiko Hirabayashi |
| 2015 | Physically Secure Code and Data Storage in Autonomously Booting Systems. Johannes Götzfried, Johannes Hampel, Tilo Müller |
| 2015 | Privacy and Trust in Smart Camera Sensor Networks. Michael Loughlin, Asma Adnane |
| 2015 | Publicly Verifiable Private Aggregation of Time-Series Data. Bence Gabor Bakondi, Andreas Peter, Maarten H. Everts, Pieter H. Hartel, Willem Jonker |
| 2015 | QR Code Security - How Secure and Usable Apps Can Protect Users Against Malicious QR Codes. Katharina Krombholz, Peter Frühwirt, Thomas Rieder, Ioannis Kapsalis, Johanna Ullrich, Edgar R. Weippl |
| 2015 | Risk Assessment of Public Safety and Security Mobile Service. Matti J. Peltola, Pekka Kekolahti |
| 2015 | Securing Web Applications with Better "Patches": An Architectural Approach for Systematic Input Validation with Security Patterns. Jung-Woo Sohn, Jungwoo Ryoo |
| 2015 | Security Monitoring in the Cloud: An SLA-Based Approach. Valentina Casola, Alessandra De Benedictis, Massimiliano Rak |
| 2015 | Security Monitoring of HTTP Traffic Using Extended Flows. Martin Husák, Petr Velan, Jan Vykopal |
| 2015 | Steg Blocks: Ensuring Perfect Undetectability of Network Steganography. Wojciech Fraczek, Krzysztof Szczypiorski |
| 2015 | Steganalysis of Low Bit-Rate Speech Based on Statistic Characteristics of Pulse Positions. Hui Tian, Yanpeng Wu, Yongfeng Huang, Jin Liu, Yonghong Chen, Tian Wang, Yiqiao Cai |
| 2015 | Structural Weaknesses in the Open Smart Grid Protocol. Klaus Kursawe, Christiane Peters |
| 2015 | TEAR: A Multi-purpose Formal Language Specification for TEsting at Runtime. Jorge López, Stéphane Maag, Gerardo Morales |
| 2015 | The Effects of Cultural Dimensions on the Development of an ISMS Based on the ISO 27001. Bahareh Shojaie, Hannes Federrath, Iman Saberi |
| 2015 | The Measurement of Data Locations in the Cloud. Bernd Jäger, Reiner Kraft, Sebastian Luhn, Annika Selzer, Ulrich Waldmann |
| 2015 | The Role and Security of Firewalls in IaaS Cloud Computing. Jordan Cropper, Johanna Ullrich, Peter Frühwirt, Edgar R. Weippl |
| 2015 | Towards Abuse Detection and Prevention in IaaS Cloud Computing. Jens Lindemann |
| 2015 | Towards Black Box Testing of Android Apps. Yury Zhauniarovich, Anton Philippov, Olga Gadyatskaya, Bruno Crispo, Fabio Massacci |
| 2015 | Towards a CERT-Communication Model as Basis to Software Assurance. Otto Hellwig, Gerald Quirchmayr, Edith Huber, Timo Mischitz, Markus Huber |
| 2015 | Towards a Process-Centered Resilience Framework. Richard M. Zahoransky, Christian Brenig, Thomas G. Koslowski |
| 2015 | Towards the Forensic Identification and Investigation of Cloud Hosted Servers through Non-Invasive Wiretaps. Hessel Schut, Mark Scanlon, Jason Farina, Nhien-An Le-Khac |
| 2015 | Trust Negotiation Based Approach to Enforce MANET Routing Security. Aida Ben Chehida Douss, Samiha Ayed, Ryma Abassi, Nora Cuppens, Sihem Guemara El Fatmi |
| 2015 | Trust me, I'm a Root CA! Analyzing SSL Root CAs in Modern Browsers and Operating Systems. Tariq Fadai, Sebastian Schrittwieser, Peter Kieseberg, Martin Mulazzani |
| 2015 | Uncovering Use-After-Free Conditions in Compiled Code. David Dewey, Bradley Reaves, Patrick Traynor |
| 2015 | Using Facebook for Image Steganography. Jason Hiney, Tejas Dakve, Krzysztof Szczypiorski, Kris Gaj |
| 2015 | Video Spatio-Temporal Filtering Based on Cameras and Target Objects Trajectories - Videosurveillance Forensic Framework. Dana Codreanu, André Péninou, Florence Sèdes |
| 2015 | Virtual Machine Introspection: Techniques and Applications. Yacine Hebbal, Sylvie Laniepce, Jean-Marc Menaud |
| 2015 | Watch What You Wear: Preliminary Forensic Analysis of Smart Watches. Ibrahim M. Baggili, Jeff Oduro, Kyle Anthony, Frank Breitinger, Glenn McGee |
| 2015 | Yet Another Cybersecurity Roadmapping Methodology. Davide Ariu, Luca Didaci, Giorgio Fumera, Enrico Frumento, Federica Freschi, Giorgio Giacinto, Fabio Roli |