| 2010 | A multi-view approach for embedded information system security. Manuel Munier |
| 2010 | A new payment protocol over the Internet. Pierre Girard, Karine Villegas, Jean-Louis Lanet, Aude Plateaux |
| 2010 | An intruder model for trust negotiation. Philippe Balbiani, Yannick Chevalier, Marwa El Houri |
| 2010 | CRiSIS 2010, Proceedings of the Fifth International Conference on Risks and Security of Internet and Systems, Montreal, QC, Canada, October 10-13, 2010 |
| 2010 | Host-based anomaly detection for pervasive medical systems. Biniyam Asfaw, Dawit Bekele, Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam |
| 2010 | Insights from the analysis of the Mariposa botnet. Prosenjit Sinha, Amine Boukhtouta, Victor Heber Belarde, Mourad Debbabi |
| 2010 | Mitigation of topology control traffic attacks in OLSR networks. Gimer Cervera, Michel Barbeau, Joaquín García-Alfaro, Evangelos Kranakis |
| 2010 | Not so fast flux networks for concealing scam servers. Theodore O. Cochran, James Cannady |
| 2010 | Performance assessment of a distributed intrusion detection system in a real network scenario. Salvatore D'Antonio, Valerio Formicola, Claudio Mazzariello, Francesco Oliviero, Simon Pietro Romano |
| 2010 | SAFE-OS: A secure and usable desktop operating system. François Lesueur, Ala Rezmerita, Thomas Hérault, Sylvain Peyronnet, Sébastien Tixeuil |
| 2010 | Satisfiability of general intruder constraints with a set constructor. Tigran Avanesov, Yannick Chevalier, Michaël Rusinowitch, Mathieu Turuani |
| 2010 | Solution to the wireless evil-twin transmitter attack. Payal Bhatia, Christine Laurendeau, Michel Barbeau |
| 2010 | Towards Internet voting security: A threat tree for risk assessment. John Harold Pardue, Alec Yasinsac, Jeffrey P. Landry |