| 2008 | A Byzantine solution to early detect massive attacks. Khaled Barbaria, Belhassen Zouari |
| 2008 | A comparative study of secret code variants in terms of keystroke dynamics. Narainsamy Pavaday, K. M. S. Soyjaudah |
| 2008 | A formal security framework for mobile agent systems: Specification and verification. Monia Loulou, Ahmed Hadj Kacem, Mohamed Jmaiel, Mohamed Mosbah |
| 2008 | A new covert channel in WIFI networks. Lilia Frikha, Zouheir Trabelsi |
| 2008 | A new timestamping schema in the Bounded Storage Model. Assia Ben Shil, Kaouthar Blibech, Riadh Robbana |
| 2008 | Access control for cooperative systems: A comparative analysis. Amine Baïna, Yves Deswarte, Anas Abou El Kalam, Mohamed Kaâniche |
| 2008 | An algebraic-functional framework for distributed access control. Clara Bertolissi, Maribel Fernández |
| 2008 | An ontology-based approach to react to network attacks. Nora Cuppens-Boulahia, Frédéric Cuppens, Jorge E. López de Vergara, Enrique Vázquez, Javier Guerra, Hervé Debar |
| 2008 | Analysis of Peer-to-Peer networks from a dependability perspective. Hakem Beitollahi, Geert Deconinck |
| 2008 | Anomaly-based intrusion detection using distributed intelligent systems. Benoit Morel |
| 2008 | Application framework for high security requirements in R&D environments based on quantum cryptography. Christian Kollmitzer, Oliver Maurhart, Stefan Schauer, Stefan Rass |
| 2008 | Apport de la cryptographie elliptique dans le vote électronique. Souheib Yousfi, Alexis Bonnecaze, Riadh Robbana |
| 2008 | Aspect-based enforcement of formal delegation policies. Slim Kallel, Anis Charfi, Mira Mezini, Mohamed Jmaiel |
| 2008 | Automated reaction based on risk analysis and attackers skills in intrusion detection systems. Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, José Araujo |
| 2008 | CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008 Mohamed Jmaiel, Mohamed Mosbah |
| 2008 | Case study: Using digital signatures for the archival of medical records in hospitals. Sebastian Sageder, Johannes Sametinger, Andreas Wiesauer |
| 2008 | Comparing Chord, CAN, and Pastry overlay networks for resistance to DoS attacks. Hakem Beitollahi, Geert Deconinck |
| 2008 | EESP: A Security protocol that supports QoS management. Mahmoud Mostafa, Anas Abou El Kalam, Christian Fraboul |
| 2008 | Economic-based vs. nature-inspired intruder detection in sensor networks. Fatma Mili, Swapna Ghanekar, Nancy Alrajei |
| 2008 | Efficient detection of DDoS attacks with important attributes. Wei Wang, Sylvain Gombault |
| 2008 | Extended UML activity diagram for composing Grid services workflows. Yousra Bendaly Hlaoui, Leila Jemni Ben Ayed |
| 2008 | Firewalls anomalies' detection system based on web services / mobile agents interactions. Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala |
| 2008 | Formal procedural security modeling and analysis. Komminist Weldemariam, Adolfo Villafiorita |
| 2008 | If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network. Christophe Incoul, Benjamin Gâteau, Jocelyn Aubert, Nicolas Bounoughaz, Christophe Feltus |
| 2008 | Policy-based intrusion detection in Web applications by monitoring Java information flows. Guillaume Hiet, Valérie Viet Triem Tong, Ludovic Mé, Benjamin Morin |
| 2008 | Quality assurance of Grid service provisioning by risk aware managing of resource failures. Axel Keller, Kerstin Voß, Dominic Battré, Matthias Hovestadt, Odej Kao |
| 2008 | Reputation based clustering algorithm for security management in ad hoc networks with liars. Mohamed Elhoucine Elhdhili, Lamia Ben Azzouz, Farouk Kamoun |
| 2008 | Revisiting enforceable security policies. Naoyuki Nagatou |
| 2008 | Security analysis of the Dependability, Security Reconfigurability framework. Tim Hartog, Geert Kleinhuis |
| 2008 | Towards a new user Anonymity Preserving Protocol (APP) for MANETs. Nadia Chalabi, Abdallah Mhamed, Belhadri Messabih |
| 2008 | Towards a robust privacy and anonymity preserving architecture for ubiquitous computing. Pierre E. Abi-Char, Mounir Mokhtari, Abdallah Mhamed, Bachar El-Hassan |
| 2008 | Towards an automated firewall security policies validation process. Ryma Abassi, Sihem Guemara El Fatmi |
| 2008 | Verification of Workflow processes under multilevel security considerations. Kamel Barkaoui, Rahma Ben Ayed, Hanifa Boucheneb, Awatef Hicheur |
| 2008 | VisAA: Visual analyzer for assembler. Philippe Andouard, Olivier Ly, Davy Rouillard |