| 2018 | Risks and Security of Internet and Systems - 12th International Conference, CRiSIS 2017, Dinard, France, September 19-21, 2017, Revised Selected Papers Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquín García-Alfaro |
| 2017 | A Method for Developing Qualitative Security Risk Assessment Algorithms. Gencer Erdogan, Atle Refsdal |
| 2017 | A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems. Muhammad Imran Khan, Barry O'Sullivan, Simon N. Foley |
| 2017 | A Study of Threat Detection Systems and Techniques in the Cloud. Pamela Carvallo, Ana R. Cavalli, Natalia Kushik |
| 2017 | A Vehicle Collision-Warning System Based on Multipeer Connectivity and Off-the-Shelf Smart-Devices. Bogdan Groza, Cosmin Briceag |
| 2017 | An Empirical Analysis of Risk Aversion in Malware Infections. Jude Jacob Nsiempba, Fanny Lalonde Lévesque, Nathalie De Marcellis-Warin, José M. Fernandez |
| 2017 | Automatic Vulnerability Classification Using Machine Learning. Marian Gawron, Feng Cheng, Christoph Meinel |
| 2017 | Data Hiding on Social Media Communications Using Text Steganography. Hung-Jr Shiu, Bor-Shing Lin, Bor-Shyh Lin, Po-Yang Huang, Chien-Hung Huang, Chin-Laung Lei |
| 2017 | Design and Realization of a Fully Homomorphic Encryption Algorithm for Cloud Applications. Khalil Hariss, Hassan Noura, Abed Ellatif Samhat, Maroun Chamoun |
| 2017 | Domain Name System Without Root Servers. Matthäus Wander, Christopher Boelmann, Torben Weis |
| 2017 | MA-MOrBAC: A Distributed Access Control Model Based on Mobile Agent for Multi-organizational, Collaborative and Heterogeneous Systems. Zeineb Ben Yahya, Farah Barika Ktata, Khaled Ghédira |
| 2017 | Phishing Attacks Root Causes. Hossein Abroshan, Jan Devos, Geert Poels, Eric Laermans |
| 2017 | Preventing the Drop in Security Investments for Non-competitive Cyber-Insurance Market. Fabio Martinelli, Albina Orlando, Ganbayar Uuganbayar, Artsiom Yautsiukhin |
| 2017 | Privacy Scoring of Social Network User Profiles Through Risk Analysis. Sourya Joyee De, Abdessamad Imine |
| 2017 | Remotely Assessing Integrity of Software Applications by Monitoring Invariants: Present Limitations and Future Directions. Alessio Viticchié, Cataldo Basile, Antonio Lioy |
| 2017 | Towards a Security Event Data Taxonomy. Gustavo Gonzalez Granadillo, José Rubio-Hernán, Joaquín García-Alfaro |
| 2017 | Towards an Anonymity Supported Platform for Shared Cyber Threat Intelligence. Thomas D. Wagner, Esther Palomar, Khaled Mahbub, Ali E. Abdallah |
| 2017 | Unraveling Reflection Induced Sensitive Leaks in Android Apps. Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Daya Ram Sharma, Akka Zemmari, Mohamed Mosbah, Mauro Conti |
| 2017 | Using Data Integration to Help Design More Secure Applications. Sébastien Salva, Loukmen Regainia |