| 2012 | 7th International Conference on Risks and Security of Internet and Systems, CRiSIS 2012, Cork, Ireland, October 10-12, 2012 Fabio Martinelli, Jean-Louis Lanet, William M. Fitzgerald, Simon N. Foley |
| 2012 | A honeypot for arbitrary malware on USB storage devices. Sebastian Poeplau, Jan Gassen |
| 2012 | A vector based model approach for defining trust in Multi-Organization Environments. Khalifa Toumi, César Andrés, Ana R. Cavalli, Mazen El Maarabani |
| 2012 | Anomaly analysis for Physical Access Control security configuration. William M. Fitzgerald, Fatih Turkmen, Simon N. Foley, Barry O'Sullivan |
| 2012 | Attacks against smart cards: Hands on session. Jean-Louis Lanet |
| 2012 | Browser function calls modeling for banking malware detection. Manuel García-Cervigón, Manel Medina Llinàs |
| 2012 | CRiSIS 2012 security standards tutorial. Stephen Farrell |
| 2012 | Detecting attacks against data in web applications. Romaric Ludinard, Eric Totel, Frederic Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy |
| 2012 | Distributed e-voting using the Smart Card Web Server. Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Song Dong, Konstantinos Markantonakis |
| 2012 | Don't work. Can't work? Why it's time to rethink security warnings. Kat Krol, Matthew Moroz, Martina Angela Sasse |
| 2012 | Evasion-resistant malware signature based on profiling kernel data structure objects. Ahmed F. Shosha, Chen-Ching Liu, Pavel Gladyshev, Marcus Matten |
| 2012 | Hash pile ups: Using collisions to identify unknown hash functions. R. Joshua Tobin, David Malone |
| 2012 | Improving the detection of on-line vertical port scan in IP traffic. Yousra Chabchoub, Christine Fricker, Philippe Robert |
| 2012 | Investigating the dark cyberspace: Profiling, threat-based analysis and correlation. Claude Fachkha, Elias Bou-Harb, Amine Boukhtouta, Son Dinh, Farkhund Iqbal, Mourad Debbabi |
| 2012 | Managing and accessing data in the cloud: Privacy risks and approaches. Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati |
| 2012 | Modeling the Stuxnet attack with BDMP: Towards more formal risk assessments. Siwar Kriaa, Marc Bouissou, Ludovic Piètre-Cambacédès |
| 2012 | Partitioning the Internet. Matthias Wachs, Christian Grothoff, Ramakrishna Thurimella |
| 2012 | Privacy-by-design based on quantitative threat modeling. Jesus Luna Garcia, Neeraj Suri, Ioannis Krontiris |
| 2012 | Security-related vulnerability life cycle analysis. Géraldine Vache Marconato, Vincent Nicomette, Mohamed Kaâniche |
| 2012 | Semantic matching of web services security policies. Monia Ben Brahim, Tarak Chaari, Maher Ben Jemaa, Mohamed Jmaiel |
| 2012 | Semiring-based constraint models and frameworks for security-related scenarios. Stefano Bistarelli, Francesco Santini |
| 2012 | Towards efficient access control in a mobile agent based wireless sensor network. Estanislao Mercadal, Guillermo Navarro-Arribas, Simon N. Foley, Joan Borrell |
| 2012 | Trust-based delegation for Ad Hoc QoS enhancing. Ryma Abassi, Sihem Guemara El Fatmi |