| 2013 | 9th International Conference on Information Assurance and Security, IAS 2013, Gammarth, Tunisia, December 4-6, 2013 |
| 2013 | A professional view on ebanking authentication: Challenges and recommendations. Jorge Aguila Vila, Jetzabel Serna-Olvera, Luis Fernandez, Manel Medina, Andreas Sfakianakis |
| 2013 | A secured model for Indian e-health system. Shilpa Srivastava, Namrata Agarwal, Millie Pant, Ajith Abraham |
| 2013 | A survey on digital tracing traitors schemes. Faten Chaabane, Maha Charfeddine, Chokri Ben Amar |
| 2013 | A system of abnormal behaviour detection in aerial surveillance. Ahlem Walha, Ali Wali, Adel M. Alimi |
| 2013 | A wavelet network speech recognition system to control an augmented reality object. Dhekra Bousnina, Ridha Ejbali, Mourad Zaied, Chokri Ben Amar |
| 2013 | ARMLCC: Adaptive and recovery-based Multi-Layer Connected Chain Mechanism for Multicast Source Authentication. Hamdi Eltaief, Ali El Kamel, Habib Youssef |
| 2013 | An intelligent system for video events detection. Yassine Aribi, Ali Wali, Adel M. Alimi |
| 2013 | Detecting stepping-stones under the influence of packet jittering. Wei Ding, Khoa Le, Shou-Hsuan Stephen Huang |
| 2013 | Developing ECC applications in Java Card. V. Gayoso Martínez, Luis Hernández Encinas |
| 2013 | Enhanced P2P botnets detection framework architecture with hybrid analyzer: Host-based and network-based. Raihana Syahirah Abdullah, Mohd Faizal Abdollah, Zul Azri Muhamad Noh, Siti Rahayu Selamat, Mohd Zaki Mas'ud, Shahrin Sahib |
| 2013 | Finger verification Using SVD features. Ala Balti, Mounir Sayadi, Farhat Fnaiech |
| 2013 | Flexibility vs. security in linked enterprise data access control graphs. Markus Graube, Patricia Órtiz, Manuel Carnerero, Óscar Lázaro, Mikel Uriarte, Leon Urbas |
| 2013 | Hierarchical object log format for normalisation of security events. Andrey Sapegin, David Jaeger, Amir Azodi, Marian Gawron, Feng Cheng, Christoph Meinel |
| 2013 | How to grant less permissions to facebook applications. Gianpiero Costantino, Fabio Martinelli, Daniele Sgandurra |
| 2013 | Information flow policies vs malware. Radoniaina Andriatsimandefitra, Thomas Saliou |
| 2013 | Privacy preserving processing of data decision tree based on sample selection and Singular Value Decomposition. Priyank Jain, Neelam Pathak, Pratibha Tapashetti, A. S. Umesh |
| 2013 | Profiling mobile malware behaviour through hybrid malware analysis approach. Mohd Zaki Mas'ud, Shahrin Sahib, Mohd Faizal Abdollah, Siti Rahayu Selamat, Robiah Yusof, Rabiah Ahmad |
| 2013 | Quantitative penetration testing with item response theory. Florian Arnold, Wolter Pieters, Mariëlle Stoelinga |
| 2013 | The state of the art of risk assessment and management for information systems. Lulu Liang, Wang Ren, Jing Song, Huaming Hu, Qiang He, Shuo Fang |
| 2013 | Towards enforcing on-the-fly policies in BYOD environments. Gianpiero Costantino, Fabio Martinelli, Andrea Saracino, Daniele Sgandurra |
| 2013 | Trusted integration of cloud-based NFC transaction players. Pardis Pourghomi, Muhammad Qasim Saeed, Gheorghita Ghinea |