| 2015 | Risks and Security of Internet and Systems - 9th International Conference, CRiSIS 2014, Trento, Italy, August 27-29, 2014, Revised Selected Papers Javier López, Indrajit Ray, Bruno Crispo |
| 2014 | Attacking Suggest Boxes in Web Applications Over HTTPS Using Side-Channel Stochastic Algorithms. Alexander Schaub, Emmanuel Schneider, Alexandros Hollender, Vinicius Calasans, Laurent Jolie, Robin Touillon, Annelie Heuser, Sylvain Guilley, Olivier Rioul |
| 2014 | Automated Detection of Logical Errors in Programs. George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis |
| 2014 | Context-Awareness Using Anomaly-Based Detectors for Smart Grid Domains. Cristina Alcaraz, Lorena Cazorla, Gerardo Fernandez |
| 2014 | Data Anonymization. Josep Domingo-Ferrer, Jordi Soria-Comas |
| 2014 | Detecting Anomalies in Printed Intelligence Factory Network. Matti Mantere, Mirko Sailio, Sami Noponen |
| 2014 | Evaluation of Dynamic Instantiation in CPRM-Based Systems. Ana Nieto |
| 2014 | How Robust is the Internet? - Insights from Graph Analysis. Annika Baumann, Benjamin Fabian |
| 2014 | ISER: A Platform for Security Interoperability of Multi-source Systems. Khalifa Toumi, Fabien Autrel, Ana R. Cavalli, Sammy Haddad |
| 2014 | Inter-technology Conflict Analysis for Communication Protection Policies. Cataldo Basile, Daniele Canavese, Antonio Lioy, Fulvio Valenza |
| 2014 | Key Extraction Attack Using Statistical Analysis of Memory Dump Data. Yuto Nakano, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake |
| 2014 | Latent Semantic Analysis for Privacy Preserving Peer Feedback. Mouna Selmi, Hicham Hage, Esma Aïmeur |
| 2014 | Location-Aware RBAC Based on Spatial Feature Models and Realistic Positioning. Philipp Marcus, Lorenz Schauer, Claudia Linnhoff-Popien |
| 2014 | Managing Heterogeneous Access Control Models Cross-Organization. Samira Haguouche, Zahi Jarir |
| 2014 | Online Privacy: Risks, Challenges, and New Trends. Esma Aïmeur |
| 2014 | Practical Attacks on Virtual Worlds. Graham Hili, Sheila Cobourne, Keith Mayes, Konstantinos Markantonakis |
| 2014 | Privacy Issues in Geosocial Networks. Zakaria Sahnoune, Cheu Yien Yep, Esma Aïmeur |
| 2014 | Regularity Based Decentralized Social Networks. Zhe Wang, Naftaly H. Minsky |
| 2014 | Security of the Android Operating System. Yury Zhauniarovich |
| 2014 | SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks. Andrea Burattin, Giuseppe Cascavilla, Mauro Conti |
| 2014 | TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks. Hana Fahim-Hashemi, Mohammad Zulkernine, Komminist Weldemariam |
| 2014 | Towards a Full Support of Obligations in XACML. Donia El Kateb, Yehia Elrakaiby, Tejeddine Mouelhi, Iram Rubab, Yves Le Traon |
| 2014 | Two-Level Automated Approach for Defending Against Obfuscated Zero-Day Attacks. Ratinder Kaur, Maninder Singh |