| 2016 | 'CTRL_S' - A Security Tool for SESAR's Design-In Security Approach. Karol Gotz, Martin Hawley, Chris Machin, John Hird |
| 2016 | 11th International Conference on Availability, Reliability and Security, ARES 2016, Salzburg, Austria, August 31 - September 2, 2016 |
| 2016 | A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment. Saad Alqahtany, Nathan L. Clarke, Steven Furnell, Christoph Reich |
| 2016 | A Hazus-Based Method for Assessing Robustness of Electricity Supply to Critical Smart Grid Consumers during Flood Events. Alexandr Vasenev, Lorena Montoya, Andrea Ceccarelli |
| 2016 | A Host-Based Intrusion Detection and Mitigation Framework for Smart Home IoT Using OpenFlow. Mehdi Nobakht, Vijay Sivaraman, Roksana Boreli |
| 2016 | A Log-Structured Block Preservation and Restoration System for Proactive Forensic Data Collection in the Cloud. Manabu Hirano, Hiromu Ogawa |
| 2016 | A Model-Based Approach for Aviation Cyber Security Risk Assessment. Tobias Kiesling, Matias Krempel, Josef Niederl, Jürgen Ziegler |
| 2016 | A New Vision for ATM Security Management: The Security Management Platform. Claudio Porretti, Raoul Lahaije, Denis Kolev |
| 2016 | A Peek under the Hood of iOS Malware. Laura García, Ricardo J. Rodríguez |
| 2016 | A Recommender-Based System for Assisting Non-technical Users in Managing Android Permissions. Arnaud Oglaza, Romain Laborde, Abdelmalek Benzekri, François Barrère |
| 2016 | A Security Game Model for Remote Software Protection. Nicola Basilico, Andrea Lanzi, Mattia Monga |
| 2016 | A Type System for Quantified Information-Flow Security in Java-Like Languages. Gohar Shakoori, Mehran S. Fallah, Zeinab Iranmanesh |
| 2016 | ARTIST: The Android Runtime Instrumentation Toolkit. Lukas Dresel, Mykolai Protsenko, Tilo Müller |
| 2016 | Access Control and Data Separation Metrics in Cloud Infrastructures. Bernd Jäger, Reiner Kraft, Sebastian Luhn, Annika Selzer, Ulrich Waldmann |
| 2016 | Addressing Security in the ATM Environment: From Identification to Validation of Security Countermeasures with Introduction of New Security Capabilities in the ATM System Context. Patrizia Montefusco, Rosana Casar, Rainer Koelle, Tim H. Stelkens-Kobsch |
| 2016 | Agile Team Members Perceptions on Non-functional Testing: Influencing Factors from an Empirical Study. Cristina Rosa Camacho, Sabrina Marczak, Daniela S. Cruzes |
| 2016 | Air Traffic Management Security Research in SESAR. John Hird, Martin Hawley, Chris Machin |
| 2016 | An Empirical Study on GSN Usage Intention: Factors Influencing the Adoption of Geo-Social Networks. Esma Aïmeur, Sébastien Gambs, Cheu Yien Yep |
| 2016 | An Empirical Study on the Relationship between Software Security Skills, Usage and Training Needs in Agile Settings. Tosin Daniel Oyetoyan, Daniela Soares Cruzes, Martin Gilje Jaatun |
| 2016 | Authentication in the Context of E-Participation: Current Practice, Challenges and Recommendations. Maria Leitner, Arndt Bonitz |
| 2016 | Automated Issuance of Digital Certificates through the Use of Federations. Thaís Bardini Idalino, Marina Coelho, Jean Everson Martina |
| 2016 | Byzantine Set-Union Consensus Using Efficient Set Reconciliation. Florian Dold, Christian Grothoff |
| 2016 | CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing. Felix Hörandner, Stephan Krenn, Andrea Migliavacca, Florian Thiemer, Bernd Zwattendorfer |
| 2016 | Caller-Centrality: Identifying Telemarketers in a VoIP Network. Muhammad Ajmal Azad, Syed Khurram Rizvi |
| 2016 | Case Study of Security Development in an Agile Environment: Building Identity Management for a Government Agency. Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen |
| 2016 | Classification of Short Messages Initiated by Mobile Malware. Marián Kühnel, Ulrike Meyer |
| 2016 | Co-creating Security-and-Privacy-by-Design Systems. Sauro Vicini, Francesco Alberti, Nicolás Notario, Alberto Crespo, Juan Ramón Troncoso-Pastoriza, Alberto Sanna |
| 2016 | Collaborative Attribute Retrieval in Environment with Faulty Attribute Managers. Mario Faiella, Fabio Martinelli, Paolo Mori, Andrea Saracino, Mina Sheikhalishahi |
| 2016 | Computational, Communicative, and Legal Conditions for Using Social Media in Disaster Management in Germany. Sabine Gründer-Fahrer, Christian Berger, Antje Schlaf, Gerhard Heyer |
| 2016 | Cryptographically Enforced Four-Eyes Principle. Arne Bilzhause, Manuel Huber, Henrich C. Pöhls, Kai Samelin |
| 2016 | Cyber Security Incident Management in the Aviation Domain. Martin Gilje Jaatun, Rainer Koelle |
| 2016 | Detecting Packed Executable File: Supervised or Anomaly Detection Method? Neminath Hubballi, Himanshu Dogra |
| 2016 | Development of an AUTOSAR Compliant Cryptographic Library on State-of-the-Art Automotive Grade Controllers. Pal-Stefan Murvay, Alexandru Matei, Cristina Solomon, Bogdan Groza |
| 2016 | Digital Forensic Artifacts of the Cortana Device Search Cache on Windows 10 Desktop. Patrício Domingues, Miguel Frade |
| 2016 | Disaster-Related Public Speeches: The Role of Emotions. Maria Spyropoulou, Khurshid Ahmad |
| 2016 | Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System. Denise Demirel, Stephan Krenn, Thomas Lorünser, Giulia Traverso |
| 2016 | Energy Efficient Mutual Authentication and Key Agreement Scheme with Strong Anonymity Support for Secure Ubiquitious Roaming Services. Prosanta Gope, Ruei-Hau Hsu, Jemin Lee, Tony Q. S. Quek |
| 2016 | Ensuring Security of Data and Information Flow in Emergency Response Decision Support. Damian Jackson, Paul Hayes |
| 2016 | Ensuring the Authenticity and Fidelity of Captured Photos Using Trusted Execution and Mobile Application Licensing Capabilities. Kostantinos Papadamou, Riginos Samaras, Michael Sirivianos |
| 2016 | Exploring the Usage of Topic Modeling for Android Malware Static Analysis. Eric Medvet, Francesco Mercaldo |
| 2016 | Extraction and Analysis of Volatile Memory in Android Systems: An Approach Focused on Trajectory Reconstruction Based on NMEA 0183 Standard. Joao Paulo Claudino de Sousa, João José Costa Gondim |
| 2016 | FEBA: An Action-Based Feature Extraction Framework for Behavioural Identification and Authentication. Luigi Stammati, Claudio Pisa, Tooska Dargahi, Alberto Caponi, Giuseppe Bianchi |
| 2016 | Geographic Localization of an Anonymous Social Network Message Data Set. Alexander Böhm, Benjamin Taubmann, Hans P. Reiser |
| 2016 | Hand Dynamics for Behavioral User Authentication. Fuensanta Torres Garcia, Katharina Krombholz, Rudolf Mayer, Edgar R. Weippl |
| 2016 | How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection. Nikhil Tripathi, Neminath Hubballi, Yogendra Singh |
| 2016 | Hybrid Focused Crawling for Homemade Explosives Discovery on Surface and Dark Web. Christos Iliou, George Kalpakis, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris |
| 2016 | HyperCrypt: Hypervisor-Based Encryption of Kernel and User Space. Johannes Götzfried, Nico Dorr, Ralph Palutke, Tilo Müller |
| 2016 | IFCaaS: Information Flow Control as a Service for Cloud Security. Marwa Elsayed, Mohammad Zulkernine |
| 2016 | Identification and Analysis of Email and Contacts Artefacts on iOS and OS X. Kenneth M. Ovens, Gordon Morison |
| 2016 | Introducing Proxy Voting to Helios. Oksana Kulyk, Karola Marky, Stephan Neumann, Melanie Volkamer |
| 2016 | Involving End Users into Collaborative Software Development: The Showcase of CloudTeams. Sebastian Franken, Sabine Kolvenbach, Wolfgang Gräther |
| 2016 | Law Enforcement Access to Password Protected and/or Encrypted Mobile Data. Murdoch Watney |
| 2016 | Legal Implications of Using Social Media Data in Emergency Response. Christian Berger, Paolo de Stefani, Taiwo A. Oriola |
| 2016 | Lightweight Encryption for Smart Home. Sanaah Al Salami, Joonsang Baek, Khaled Salah, Ernesto Damiani |
| 2016 | Major Challenges in Structuring and Institutionalizing CERT-Communication. Otto Hellwig, Gerald Quirchmayr, Edith Huber, Gernot Goluch, Franz Vock, Bettina Pospisil |
| 2016 | Malware in Pirated Software: Case Study of Malware Encounters in Personal Computers. Svrana Kumar, Logesh Madhavan, Mangalam Nagappan, Biplab Sikdar |
| 2016 | Misuse, Abuse and Reuse: Economic Utility Functions for Characterising Security Requirements. Chad Heitzenrater, Andrew C. Simpson |
| 2016 | No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large. Wilfried Mayer, Aaron Zauner, Martin Schmiedecker, Markus Huber |
| 2016 | Notary-Assisted Certificate Pinning for Improved Security of Android Apps. Georg Merzdovnik, Damjan Buhov, Artemios G. Voyiatzis, Edgar R. Weippl |
| 2016 | On Analyzing Program Behavior under Fault Injection Attacks. Jakub Breier |
| 2016 | POTR: Practical On-the-Fly Rejection of Injected and Replayed 802.15.4 Frames. Konrad-Felix Krentz, Christoph Meinel, Maxim Schnjakin |
| 2016 | PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services. Thomas Lorünser, Daniel Slamanig, Thomas Länger, Henrich C. Pöhls |
| 2016 | Privacy Impact Assessment Template for Provenance. Jenni Reuben, Leonardo A. Martucci, Simone Fischer-Hübner, Heather S. Packer, Hans Hedbom, Luc Moreau |
| 2016 | Privacy Preserving Computations for Viral Marketing: The Case of Rational Players. Rica Gonen, Tamir Tassa |
| 2016 | Protecting Sensitive Information in the Volatile Memory from Disclosure Attacks. Stefanos Malliaros, Christoforos Ntantogian, Christos Xenakis |
| 2016 | Provable User Authentication Scheme in Telecare Medicine Information System Using Elliptic Curve Cryptosystem. Toan-Thinh Truong, Duong-Tien Phan, Minh-Triet Tran, Anh Duc Duong, Isao Echizen |
| 2016 | Ransomware Inside Out. Francesco Mercaldo, Vittoria Nardone, Antonella Santone |
| 2016 | Recognizing Time-Efficiently Local Botnet Infections - A Case Study. Tanja Heuer, Ina Schiering, Frank Klawonn, Alexander Gabel, Martin Seeger |
| 2016 | Revisiting a Watermark-Based Detection Scheme to Handle Cyber-Physical Attacks. Jose Rubio-Hernan, Luca De Cicco, Joaquín García-Alfaro |
| 2016 | Role Mining with Missing Values. Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone |
| 2016 | SPARER: Secure Cloud-Proof Storage for e-Health Scenarios. Gabriela Gheorghe, Muhammad Rizwan Asghar, Jean Lancrenon, Sankalp Ghatpande |
| 2016 | SecDevOps: Is It a Marketing Buzzword? - Mapping Research on Security in DevOps. Vaishnavi Mohan, Lotfi Ben Othmane |
| 2016 | Security Risk Assessment and Risk Treatment for Integrated Modular Communication. Hamid Asgari, Sarah Haines, Adrian Waller |
| 2016 | Security Testing with Controller-Pilot Data Link Communications. Doris di Marco, Alessandro Manzo, Marco Ivaldi, John Hird |
| 2016 | Selection of Mitigation Actions Based on Financial and Operational Impact Assessments. Gustavo Gonzalez Granadillo, Alexander Motzek, Joaquín García-Alfaro, Hervé Debar |
| 2016 | SmartNet: Secure Content Sharing for Peer-to-Peer Smart Group Spaces. Brian Greaves, Marijke Coetzee |
| 2016 | Social Analytics in an Enterprise Context: From Manufacturing to Software Development. Evangelos Arvanitakis, Michael Petychakis, Evmorfia Biliri, Ariadni Michalitsi-Psarrou, Panagiotis Kokkinakos, Fenareti Lampathaki, Dimitrios Askounis |
| 2016 | Spotting the Malicious Moment: Characterizing Malware Behavior Using Dynamic Features. Alberto Ferrante, Eric Medvet, Francesco Mercaldo, Jelena Milosevic, Corrado Aaron Visaggio |
| 2016 | Stopping Amplified DNS DDoS Attacks through Distributed Query Rate Sharing. Saurabh Verma, Ali Hamieh, Jun Ho Huh, Henrik Holm, Siva Raj Rajagopalan, Maciej Korczynski, Nina H. Fefferman |
| 2016 | Synchronous One Time Biometrics with Pattern Based Authentication. Patrick Lacharme, Christophe Rosenberger |
| 2016 | Tackling the Cloud Adoption Dilemma - A User Centric Concept to Control Cloud Migration Processes by Using Machine Learning Technologies. Michael Diener, Leopold Blessing, Nina Rappel |
| 2016 | The Application of Social Media Image Analysis to an Emergency Management System. Min Jing, Bryan W. Scotney, Sonya A. Coleman, T. Martin McGinnity |
| 2016 | The Case for RAID 4: Cloud-RAID Integration with Local Storage. Christopher Hansen, James K. Archibald |
| 2016 | The Landscape of Domain Name Typosquatting: Techniques and Countermeasures. Jeffrey Spaulding, Shambhu J. Upadhyaya, Aziz Mohaisen |
| 2016 | The Perfect Storm: The Privacy Paradox and the Internet-of-Things. Meredydd Williams, Jason R. C. Nurse, Sadie Creese |
| 2016 | The Slandail Monitor: Real-Time Processing and Visualisation of Social Media Data for Emergency Management. Xiubo Zhang, Stephen Kelly, Khurshid Ahmad |
| 2016 | The Value of Online Users: Empirical Evaluation of the Price of Personalized Ads. Miriam Marciel, José González Cabañas, Yonas Mitike Kassa, Roberto Gonzalez, Mohamed Ahmed |
| 2016 | Threat Modelling Service Security as a Security Ceremony. Taciane Martimiano, Jean Everson Martina |
| 2016 | Threat from Within: Case Studies of Insiders Who Committed Information Technology Sabotage. Jason W. Clark |
| 2016 | Towards Cycle-Accurate Emulation of Cortex-M Code to Detect Timing Side Channels. Johannes Bauer, Felix C. Freiling |
| 2016 | Towards Digital Investigation in Virtual Networks: A Study of Challenges and Open Problems. Daniel Spiekermann, Tobias Eggendorfer |
| 2016 | Towards Effective Security Assurance for Incremental Software Development the Case of Zen Cart Application. Lotfi Ben Othmane, Azmat Ali |
| 2016 | Towards Secure Collaboration in Federated Cloud Environments. Bojan Suzic, Andreas Reiter |
| 2016 | Towards a CDS-based Intrusion Detection Deployment Scheme for Securing Industrial Wireless Sensor Networks. Lyes Bayou, Nora Cuppens-Boulahia, David Espes, Frédéric Cuppens |
| 2016 | Towards a Complex Systems Approach to Legal and Economic Impact Analysis of Critical Infrastructures. Thomas Schaberreiter, Gerald Quirchmayr, Anna-Maija Juuso, Moussa Ouedraogo, Juha Röning |
| 2016 | Towards a Metamodel for SABSA Conceptual Architecture Descriptions. Patrick Pleinevaux |
| 2016 | Towards a Systemic Approach for Information Security Risk Management. Yannick Naudet, Nicolas Mayer, Christophe Feltus |
| 2016 | Towards a Unified Secure Cloud Service Development and Deployment Life-Cycle. Aleksandar Hudic, Matthias Flittner, Thomas Lorünser, Philipp M. Radl, Roland Bless |
| 2016 | Usable Privacy-Aware Logging for Unstructured Log Entries. Christof Rath |
| 2016 | Using Crowdsourced and Anonymized Personas in the Requirements Elicitation and Software Development Phases of Software Engineering. Iosif Alvertis, Dimitris Papaspyros, Sotiris Koussouris, Spyros Mouzakitis, Dimitris Askounis |
| 2016 | Using Expert Systems to Statically Detect "Dynamic" Conflicts in XACML. Bernard Stepien, Amy P. Felty |
| 2016 | V-DIFT: Vector-Based Dynamic Information Flow Tracking with Application to Locating Cryptographic Keys for Reverse Engineering. Antonio M. Espinoza, Jeffrey Knockel, Pedro Comesaña Alfaro, Jedidiah R. Crandall |
| 2016 | VoIP Profiler: Profiling Voice over IP User Communication Behavior. Sainath Batthala, Mayank Swarnkar, Neminath Hubballi, Maitreya Natu |
| 2016 | What's Your Major Threat? On the Differences between the Network Behavior of Targeted and Commodity Malware. Enrico Mariconti, Jeremiah Onaolapo, Gordon J. Ross, Gianluca Stringhini |
| 2016 | Your Cloud in My Company: Modern Rights Management Services Revisited. Martin Grothe, Christian Mainka, Paul Rösler, Johanna Jupke, Jan Kaiser, Jörg Schwenk |
| 2016 | Your Data in the Eyes of the Beholders: Design of a Unified Data Valuation Portal to Estimate Value of Personal Information from Market Perspective. Yonas Mitike Kassa, José González Cabañas, Ángel Cuevas, Rubén Cuevas Rumín, Miriam Marciel, Roberto Gonzalez |
| 2016 | k-Times Full Traceable Ring Signature. Xavier Bultel, Pascal Lafourcade |
| 2016 | pwnPr3d: An Attack-Graph-Driven Probabilistic Threat-Modeling Approach. Pontus Johnson, Alexandre Vernotte, Mathias Ekstedt, Robert Lagerström |