| 2013 | Security and Privacy in Communication Networks - 8th International ICST Conference, SecureComm 2012, Padua, Italy, September 3-5, 2012. Revised Selected Papers Angelos D. Keromytis, Roberto Di Pietro |
| 2012 | A Detection Mechanism for SMS Flooding Attacks in Cellular Networks. Eun-Kyoung Kim, Patrick D. McDaniel, Thomas La Porta |
| 2012 | A Voice Spam Filter to Clean Subscribers' Mailbox. Seyed Amir Iranmanesh, Hemant Sengar, Haining Wang |
| 2012 | Anonymous Transferable Conditional E-cash. Jiangxiao Zhang, Zhoujun Li, Hua Guo |
| 2012 | BINSPECT: Holistic Analysis and Detection of Malicious Web Pages. Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam |
| 2012 | Building General-Purpose Security Services on EMV Payment Cards. Chunhua Chen, Shaohua Tang, Chris J. Mitchell |
| 2012 | DAFA - A Lightweight DES Augmented Finite Automaton Cryptosystem. Sarshad Abubaker, Kui Wu |
| 2012 | Data Leak Detection as a Service. Xiaokui Shu, Danfeng (Daphne) Yao |
| 2012 | Detection of Configuration Vulnerabilities in Distributed (Web) Environments. Matteo Maria Casalino, Michele Mangili, Henrik Plate, Serena Elisa Ponta |
| 2012 | Improvement on Ahn et al.'s RSA P-Homomorphic Signature Scheme. Zhiwei Wang |
| 2012 | Improving the Resilience of an IDS against Performance Throttling Attacks. Govind Sreekar Shenoy, Jordi Tubella, Antonio González |
| 2012 | JSGuard: Shellcode Detection in JavaScript. Boxuan Gu, Wenbin Zhang, Xiaole Bai, Adam C. Champion, Feng Qin, Dong Xuan |
| 2012 | More Anonymity through Trust Degree in Trust-Based Onion Routing. Peng Zhou, Xiapu Luo, Rocky K. C. Chang |
| 2012 | New Multi-dimensional Sorting Based K-Anonymity Microaggregation for Statistical Disclosure Control. Abdun Naser Mahmood, Md. Enamul Kabir, Abdul K. Mustafa |
| 2012 | Privacy Preserving Back-Propagation Learning Made Practical with Cloud Computing. Jiawei Yuan, Shucheng Yu |
| 2012 | Random Host Mutation for Moving Target Defense. Ehab Al-Shaer, Qi Duan, Jafar Haadi Jafarian |
| 2012 | Revealing Cooperating Hosts by Connection Graph Analysis. Jan Jusko, Martin Rehák |
| 2012 | Set Difference Attacks in Wireless Sensor Networks. Tulio de Souza, Joss Wright, Piers O'Hanlon, Ian Brown |
| 2012 | The Unbearable Lightness of Monitoring: Direct Monitoring in BitTorrent. Tom Chothia, Marco Cova, Chris Novakovic, Camilo González Toro |
| 2012 | Towards Designing Packet Filter with a Trust-Based Approach Using Bayesian Inference in Network Intrusion Detection. Yuxin Meng, Lam-for Kwok, Wenjuan Li |
| 2012 | Towards a Framework for Evaluating the Security of Physical-Layer Identification Systems. Ryan M. Gerdes, Mani Mina, Thomas E. Daniels |
| 2012 | Two Improvements of Random Key Predistribution for Wireless Sensor Networks. Jirí Kur, Vashek Matyás, Petr Svenda |