| 2015 | A New Science of Security Decision Making. Patrick D. McDaniel |
| 2015 | A Novel Anonymous Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks. Carsten Büttner, Sorin A. Huss |
| 2015 | A Novel Model of Security Policies and Requirements. Preetam Mukherjee, Chandan Mazumdar |
| 2015 | A Policy-based Communications Architecture for Vehicles. Vassilis Prevelakis, Mohammad Hamad |
| 2015 | A Posteriori Process Security Control. Rafael Accorsi |
| 2015 | A Scratch-based Graphical Policy Editor for XACML. Henrik Nergaard, Nils Ulltveit-Moe, Terje Gjøsæter |
| 2015 | A Structural and Content-based Approach for a Precise and Robust Detection of Malicious PDF Files. Davide Maiorca, Davide Ariu, Igino Corona, Giorgio Giacinto |
| 2015 | Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss. Aderonke Busayo Sakpere, Anne V. D. M. Kayem |
| 2015 | Analyzing Quality Criteria in Role-based Identity and Access Management. Michael Kunz, Ludwig Fuchs, Michael Netter, Günther Pernul |
| 2015 | Assessing Information Security Risks of AMI - What Makes it so Difficult?. Inger Anne Tøndel, Maria B. Line, Gorm Johansen |
| 2015 | Balancing is the Key - Performing Finger Vein Template Protection using Fuzzy Commitment. Mélanie Favre, Sylvaine Picard, Julien Bringer, Hervé Chabanne |
| 2015 | Bilinear Pairing-based Hybrid Mixnet with Anonymity Revocation. Andrea Huszti, Zita Kovács |
| 2015 | Clustering Spam Emails into Campaigns. Mina Sheikh Alishahi, Mohamed Mejri, Nadia Tawbi |
| 2015 | Defeating DDoS using Productive Puzzles. Mehmud Abliz, Taieb F. Znati |
| 2015 | EvaBio Platform for the Evaluation Biometric System - Application to the Optimization of the Enrollment Process for Fingerprints Devices. Benoît Vibert, Zhigang Yao, Sylvain Vernois, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger |
| 2015 | Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security. Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, Olivier Festor |
| 2015 | Expansions of CHAP - Modificationless on Its Structures of Packet and Data Exchange. Masaki Inamura |
| 2015 | Filtering Unfair Users - A Hidden Markov Model Approach. Bushra Anjum, Manish Rajangam, Harry G. Perros, Wenjuan Fan |
| 2015 | Fingerprint Quality Assessment Combining Blind Image Quality, Texture and Minutiae Features. Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger |
| 2015 | From Passwords to Biometrics - In Pursuit of a Panacea. Steven Furnell |
| 2015 | HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption. Jayagopal Narayanaswamy, Raghav V. Sampangi, Srinivas Sampalli |
| 2015 | Hiding in a Panopticon - Grand Challenges in Internet Anonymity. Bryan Ford |
| 2015 | ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy, ESEO, Angers, Loire Valley, France, 9-11 February, 2015. Olivier Camp, Edgar R. Weippl, Christophe Bidan, Esma Aïmeur |
| 2015 | ICS/SCADA Security - Analysis of a Beckhoff CX5020 PLC. Gregor Bonney, Hans Höfken, Benedikt Paffen, Marko Schuba |
| 2015 | Implementation and Analysis of Dutch-style Sealed-bid Auctions - Computational vs Unconditional Security. Sriram Krishnamachari, Mehrdad Nojoumian, Kemal Akkaya |
| 2015 | Malfinder: Accelerated Malware Classification System through Filtering on Manycore System. Taegyu Kim, Woomin Hwang, Chulmin Kim, Dong-Jae Shin, Ki-Woong Park, Kyu Ho Park |
| 2015 | Malware Classification Method Based on Sequence of Traffic Flow. Hyoyoung Lim, Yukiko Yamaguchi, Hajime Shimada, Hiroki Takakura |
| 2015 | Model Repositories at the Enterprises and Systems Scale - The Modelio Constellation Solution. Philippe Desfray |
| 2015 | Model-driven Privacy Assessment in the Smart Grid. Fabian Knirsch, Dominik Engel, Christian Neureiter, Marc Frîncu, Viktor K. Prasanna |
| 2015 | Modelling of Enterprise Insider Threats. Puloma Roy, Chandan Mazumdar |
| 2015 | Multi-sensor Authentication to Improve Smartphone Security. Wei-Han Lee, Ruby B. Lee |
| 2015 | On Detection of Bitcoin Mining Redirection Attacks. Nicolas T. Courtois, Pinar Emirdag, Zhouyixing Wang |
| 2015 | On the Power Consumption of Cryptographic Processors in Civil Microdrones. Abdulhadi Shoufan, Hassan Alnoon, Joonsang Baek |
| 2015 | Optimizing Cryptographically based Security in Wireless Networks. Stuart Jacobs |
| 2015 | Performance-optimized Indexes for Inequality Searches on Encrypted Data in Practice. Jan Lehnhardt, Tobias Rho, Adrian Spalka, Armin B. Cremers |
| 2015 | Privacy and Security Concern of Online Social Networks from User Perspective. Al Amin Hossain, Weining Zhang |
| 2015 | Privacy in Social Networks - Existing Challenges and Proposals for Solution. Günther Pernul |
| 2015 | Private Web Search with Constant Round Efficiency. Bolam Kang, Sung Cheol Goh, Myungsun Kim |
| 2015 | Quality Assessment of Fingerprints with Minutiae Delaunay Triangulation. Zhigang Yao, Jean-Marie Le Bars, Christophe Charrier, Christophe Rosenberger |
| 2015 | Research Ethics and Public Trust, Preconditions for Continued Growth of Internet Mediated Research - Public Confidence in Internet Mediate Research. Ansgar R. Koene, Elvira Perez, Christopher James Carter, Ramona Statache, Svenja Adolphs, Claire O'Malley, Tom Rodden, Derek McAuley |
| 2015 | The Palm Vein Graph - Feature Extraction and Matching. Arathi Arakala, Hao Hao, Stephen A. Davis, Kathy J. Horadam |
| 2015 | The Smartphone as a Gait Recognition Device - Impact of Selected Parameters on Gait Recognition. Josselyn Le Moing, Ingo Stengel |
| 2015 | Understanding Information Technology Security Standards Diffusion - An Institutional Perspective. Sylvestre Uwizeyemungu, Placide Poba-Nzaou |
| 2015 | Vulnerability Analysis using Network Timestamps in Full Virtualization Virtual Machine. Matrazali Noorafiza, Hiroshi Maeda, Ryuya Uda, Toshiyuki Kinoshita, M. Shiratori |