| 2013 | 2013 International Conference on Risks and Security of Internet and Systems (CRiSIS), La Rochelle, France, October 23-25, 2013 Bruno Crispo, Ravi S. Sandhu, Nora Cuppens-Boulahia, Mauro Conti, Jean-Louis Lanet |
| 2013 | A complete tableau procedure for risk analysis. Matteo Cristani, Erisa Karafili, Luca Viganò |
| 2013 | A defensive Java Card virtual machine to thwart fault attacks by microarchitectural support. Michael Lackner, Reinhard Berlach, Michael Hraschan, Reinhold Weiss, Christian Steger |
| 2013 | A formal methodology for Enterprise Information Security risk assessment. Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar |
| 2013 | Accessing secure information using export file fraudulence. Guillaume Bouffard, Tom Khefif, Jean-Louis Lanet, Ismael Kane, Sergio Casanova Salvia |
| 2013 | An event processing approach for threats monitoring of service compositions. Dhouha Ayed, Muhammad Asim, David Llewellyn-Jones |
| 2013 | CREPUSCOLO: A collusion resistant privacy preserving location verification system. Eyüp S. Canlar, Mauro Conti, Bruno Crispo, Roberto Di Pietro |
| 2013 | Controlled information sharing for unspecified emergencies. Barbara Carminati, Elena Ferrari, Michele Guglielmi |
| 2013 | Detection of attack strategies. Suliman A. Alsuhibany, Charles Morisset, Aad P. A. van Moorsel |
| 2013 | Economic impact of software security activities in software development. Golriz Chehrazi |
| 2013 | Foreword. Jean-Louis Lanet |
| 2013 | How to develop secure applications with Aspect-Oriented Programming. Mónica Pinto, José Miguel Horcas |
| 2013 | MASS: An efficient and secure broadcast authentication scheme for resource constrained devices. Wafa Ben Jaballah, Mauro Conti, Roberto Di Pietro, Mohamed Mosbah, Nino Vincenzo Verde |
| 2013 | Misbehaviour monitoring on system-of-systems components. Nathan Shone, Qi Shi, Madjid Merabti, Kashif Kifayat |
| 2013 | Parsifal: Writing efficient and robust binary parsers, quickly. Olivier Levillain, Hervé Debar, Benjamin Morin |
| 2013 | Predictive vulnerability scoring in the context of insufficient information availability. Hamza Ghani, Jesus Luna, Abdelmajid Khelil, Najib Alkadri, Neeraj Suri |
| 2013 | Privacy-enhanced filtering and collection middleware in EPCglobal networks. Wiem Tounsi, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro |
| 2013 | Quantitative assessment of software vulnerabilities based on economic-driven security metrics. Hamza Ghani, Jesus Luna, Neeraj Suri |
| 2013 | Selective record route DoS traceback. Mohammed Alenezi, Martin J. Reed |
| 2013 | Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems. Alireza Sadighian, Saman Taghavi Zargar, José M. Fernandez, Antoine Lemay |
| 2013 | Uniqueness of the file systems genome: Supporting arguments and massive experimental measurements. Roberto Di Pietro, Luigi V. Mancini, Antonio Villani, Domenico Vitali |
| 2013 | What security for electronic exams? Rosario Giustolisi, Gabriele Lenzini, Giampaolo Bella |