| 2016 | Risks and Security of Internet and Systems - 10th International Conference, CRiSIS 2015, Mytilene, Lesbos Island, Greece, July 20-22, 2015, Revised Selected Papers Costas Lambrinoudakis, Alban Gabillon |
| 2015 | A Literature Survey and Classifications on Data Deanonymisation. Dalal Al-Azizy, David E. Millard, Iraklis Symeonidis, Kieron O'Hara, Nigel Shadbolt |
| 2015 | A Meta-model for Assisting a Cloud Forensics Process. Stavros Simou, Christos Kalloniatis, Haralambos Mouratidis, Stefanos Gritzalis |
| 2015 | A Single Key Scheduling Based Compression Function. Jiageng Chen, Rashed Mazumder, Atsuko Miyaji |
| 2015 | Addressing Privacy and Trust Issues in Cultural Heritage Modelling. Michalis Pavlidis, Haralambos Mouratidis, Cesar Gonzalez-Perez, Christos Kalloniatis |
| 2015 | An Intensive Analysis of Security and Privacy Browser Add-Ons. Nikolaos Tsalis, Alexios Mylonas, Dimitris Gritzalis |
| 2015 | An Ontology Regulating Privacy Oriented Access Controls. Maherzia Belaazi, Hanene Boussi Rahmouni, Adel Bouhoula |
| 2015 | Attack Volume Model: Geometrical Approach and Application. Gustavo Gonzalez Granadillo, Grégoire Jacob, Hervé Debar |
| 2015 | Context Aware Intrusion Response Based on Argumentation Logic. Tarek Bouyahia, Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2015 | Countermeasure Selection Based on the Attack and Service Dependency Graphs for Security Incident Management. Elena Doynikova, Igor V. Kotenko |
| 2015 | Exploring a Controls-Based Assessment of Infrastructure Vulnerability. Oliver J. Farnan, Jason R. C. Nurse |
| 2015 | Improving Users' Trust Through Friendly Privacy Policies: An Empirical Study. Oluwa Lawani, Esma Aïmeur, Kimiz Dalkir |
| 2015 | MBotCS: A Mobile Botnet Detection System Based on Machine Learning. Xin Meng, George Spanoudakis |
| 2015 | MPLS Policy Target Recognition Network. Abdulrahman Al-Mutairi, Stephen D. Wolthusen |
| 2015 | POR-2P: Network Coding-Based POR for Data Provision-Payment System. Kazumasa Omote, Tran Phuong Thao |
| 2015 | Quantifying Security in Web ETL Processes. Salma Dammak, Faiza Ghozzi Jedidi, Faïez Gargouri |
| 2015 | Quantitative Risk, Statistical Methods and the Four Quadrants for Information Security. Gaute Wangen, Andrii Shalaginov |
| 2015 | Security Issue of WirelessHART Based SCADA Systems. Lyes Bayou, David Espes, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2015 | Toward Securing MANET Against the Energy Depletion Attack. Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi |