| 2013 | A clique-based method for mining fuzzy graph patterns in anti-money laundering systems. Leonid S. Bershtein, Alexey A. Tselykh |
| 2013 | A finite transition model for security protocol verification. Yulong Fu, Ousmane Koné |
| 2013 | A flexible framework for detecting IPv6 vulnerabilities. Hosnieh Rafiee, Christoph Mueller, Lukas Niemeier, Jannik Streek, Christoph Sterz, Christoph Meinel |
| 2013 | A novel approach for dynamic authorisation planning in constrained workflow systems. Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
| 2013 | A novel threshold-based scan detection method using genetic algorithm. Morteza Barati, Karim Faez, Zahra Hakimi |
| 2013 | A possibilistic approach to intrusion detection under imperfect logging protocol. Romdhane Ben Younes, Guy Tremblay |
| 2013 | A protocol for simultaneous use of confidentiality and integrity in large-scale storage systems. Zahra Khani, Reza Azmi |
| 2013 | A review on cloud security. Duygu Sinanc, Seref Sagiroglu |
| 2013 | About responsibilities distribution for information security. Pyatkov Anton, Vyacheslav Zolotarev |
| 2013 | Addressing security challenges in WiMAX environment. Arif Sari, Behnam Rahnama |
| 2013 | An HBAC-based approximation for IBAC programs. Pablo Lamilla Álvarez, Yoshiaki Takata |
| 2013 | An access control framework for hybrid policies. Salim Khamadja, Kamel Adi, Luigi Logrippo |
| 2013 | An authentication framework for peer-to-peer cloud. Geong Sen Poh, Mohd Amril Nurman Mohd Nazir, Bok-Min Goi, Syh-Yuan Tan, Raphael Chung-Wei Phan, Maryam Safiyah Shamsudin |
| 2013 | An empirical study of three access control systems. Lihui Hu, Jean Mayo, Charles Wallace |
| 2013 | An improved fault-tolerant conference-key agreement protocol with forward secrecy. Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan |
| 2013 | Analysing attribute aggregation models in federated identity management. Md Sadek Ferdous, Ron Poet |
| 2013 | Analysis of GOST 28147-89 security: methods and algorithms. Ludmila K. Babenko |
| 2013 | AndroSimilar: robust statistical feature signature for Android malware detection. Parvez Faruki, Vijay Ganmoor, Vijay Laxmi, Manoj Singh Gaur, Ammar Bharmal |
| 2013 | Anonymity and privacy in multicast mobile ad hoc networks. Somayeh Taheri, Salke Hartung, Dieter Hogrefe |
| 2013 | Attacks on implementations of cryptographic algorithms: side-channel and fault attacks. Erkay Savas |
| 2013 | Authenticated key agreement in wireless networks with automated key management. Naïm Qachri, Frédéric Lafitte, Olivier Markowitch |
| 2013 | Authorized! access denied, unauthorized! access granted. Abdulaziz Almehmadi, Khalil El-Khatib |
| 2013 | Biometric verification using brain waves toward on-demand user management systems: performance differences between divided regions in Isao Nakanishi, Hironao Fukuda, Shigang Li |
| 2013 | Blinded additively homomorphic encryption schemes for self-tallying voting. Jérôme Dossogne, Frédéric Lafitte |
| 2013 | Building of mathematical model of flow data processing system based on given selection of elements of the set. Valeriy O. Osipyan, A. S. Zhuck, A. H. Arutyunyan, Y. A. Karpenko |
| 2013 | CGA integration into IPsec/IKEv2 authentication. Ahmad AlSa'deh, Christoph Meinel, Florian Westphal, Marian Gawron, Björn Groneberg |
| 2013 | Complexity measurement of a password for keystroke dynamics: preliminary study. Soumik Mondal, Patrick Bours, Syed Zulkarnain Syed Idrus |
| 2013 | Content-location based key management scheme for content centric networks. Sarmad Ullah Khan, Rafiullah Khan |
| 2013 | Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques. Mudassar Aslam, Christian Gehrmann, Mats Björkman |
| 2013 | Conviction model for incident reaction architecture monitoring based on automatic sensors alert detection. Christophe Feltus, Djamel Khadraoui |
| 2013 | Counterfeiting attacks on block-wise dependent fragile watermarking schemes. Hussain Nyeem, Wageeh W. Boles, Colin Boyd |
| 2013 | Countering AES static s-box attack. Behnam Rahnama, Yunus Kiran, Raz Dara |
| 2013 | Cryptanalysis of RC4(n, m) stream cipher. Mohammad Ali Orumiehchiha, Josef Pieprzyk, Elham Shakour, Ron Steinfeld |
| 2013 | D0M-WLAN: a traffic analysis based approach for detecting malicious activities on wireless networks. Rohan Nanda, P. Venkata Krishna |
| 2013 | Designing flexible access control models for the cloud. Salim Khamadja, Kamel Adi, Luigi Logrippo |
| 2013 | Development of a secure cluster-based wireless sensor network model. Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich |
| 2013 | Development the method of detection the malicious pages interconnection in the internet. Ksenia Tsyganok, Evgeny Tumoyan, Lyudmila K. Babenko |
| 2013 | Digital camera identification system. Dmitry Rublev, Vladimir Fedorov, Oleg B. Makarevich |
| 2013 | Efficient and robust data aggregation using untrusted infrastructure. Marek Klonowski, Michal Koza, Miroslaw Kutylowski |
| 2013 | EndNote vs Zotero in searching library catalog via Z39.50 of academic libraries in Thailand. Aurathai Wareesa-ard |
| 2013 | Expert key selection impact on the MANETs' performance using probabilistic key management algorithm. Mohammed Gharib, Mohsen Minaei, Morteza Golkari, Ali Movaghar |
| 2013 | Exploring attack vectors facilitated by miniaturized computers. Casey Mortensen, Ryan Winkelmaier, Jun Zheng |
| 2013 | Features extraction of fingerprints using firefly algorithm. Ziyad Tariq Mustafa Al-Ta'l, Omar Younis Abdulhameed |
| 2013 | Generalized approach to modeling user activity graphs for network security and public safety monitoring. Nikolay Sergeev, Alexey A. Tselykh, Alexander N. Tselykh |
| 2013 | Hand shape recognition using Hu and Legendre moments. Aldjia Boucetta, Kamal Eddine Melkemi |
| 2013 | Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks. Vijay Laxmi, Deepanshu Mehta, Manoj Singh Gaur, Parvez Faruki, Chhagan Lal |
| 2013 | Implementing real-time transactional security property using timed edit automata. N. Rajamanickam, R. Nadarajan |
| 2013 | Improbable differential cryptanalysis. Cihangir Tezcan |
| 2013 | Improved face recognition at a distance using light field camera & super resolution schemes. Ramachandra Raghavendra, Kiran B. Raja, Bian Yang, Christoph Busch |
| 2013 | Industry program panel. Christophe Feltus |
| 2013 | Influence of S-Boxes to the resistance of GOST algorithm against linear cryptanalysis. Ludmila K. Babenko, Evgeniya Ishchukova |
| 2013 | Information protection systems based on universal knapsack problem. Valeriy O. Osipyan |
| 2013 | Information security, risk governance and management frameworks: an overview of COBIT 5. Georges Ataya |
| 2013 | Insecurities within browser: issues and challenges. Manoj Singh Gaur, Dhiren R. Patel, Anil Saini |
| 2013 | Joux multicollisions attack in sponge construction. Mohammad A. AlAhmad, Imad Fakhri Alshaikhli, Mridul Nandi |
| 2013 | Linking business goals to information security plans and activities. Georges Ataya |
| 2013 | MAIL: Malware Analysis Intermediate Language: a step towards automating and optimizing malware detection. Shahid Alam, R. Nigel Horspool, Issa Traoré |
| 2013 | Metamodel for reputation based agents system: case study for electrical distribution SCADA design. Guy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui |
| 2013 | Multidisciplinary prospective in cryptology. Sattar B. Sadkhan, Nidaa A. Abbass |
| 2013 | Nature inspired heuristics for attack of simplified DES algorithm. T. Mekhaznia |
| 2013 | Obligations to enforce prohibitions: on the adequacy of security policies. Wolter Pieters, Julian A. Padget, Francien Dechesne, Virginia Dignum, Huib Aldewereld |
| 2013 | On authentication factors: "what you can" and "how you do it". Jérôme Dossogne, Frédéric Lafitte |
| 2013 | On designing automatic reaction strategy for critical infrastructure SCADA system. Christophe Feltus, Djamel Khadraoui |
| 2013 | Performance analysis of the developed mandatory access control system in the DBMS. Ludmila K. Babenko, Alexandr S. Basan, Oleg B. Makarevich |
| 2013 | Preventing malicious data harvesting from deallocated memory areas. Maxim Anikeev, Felix C. Freiling |
| 2013 | Privacy and security in IPv6 networks: challenges and possible solutions. Hosnieh Rafiee, Christoph Meinel |
| 2013 | ProClick: a framework for testing clickjacking attacks in web applications. Hossain Shahriar, Vamshee Krishna Devendran, Hisham Haddad |
| 2013 | Public key infrastructure for UAE: a case study. Eman Hableel, Young-Ji Byon, Joonsang Baek |
| 2013 | Robust periocular recognition by fusing local to holistic sparse representations. Juan Carlos Moreno, V. B. Surya Prasath, Hugo Proença |
| 2013 | S-box construction from non-permutation power functions. Herman Isa, Norziana Jamil, Muhammad Reza Z'aba |
| 2013 | SAT based analysis of LTE stream cipher ZUC. Frédéric Lafitte, Olivier Markowitch, Dirk Van Heule |
| 2013 | Secure and practical threshold RSA. Jérôme Dossogne, Frédéric Lafitte, Dirk Van Heule |
| 2013 | Secure true random number generator in WLAN/LAN. Alexander G. Chefranov, SeyedMasoud Alavi Abhari, Hooman Alavizadeh, Maryam Farajzadeh-Zanjani |
| 2013 | Securing the virtual machine images in cloud computing. Muhammad Kazim, Rahat Masood, Muhammad Awais Shibli |
| 2013 | Security and protection of SCADA: a bigdata algorithmic approach. R. K. Shyamasundar |
| 2013 | Security policy verification in grid systems. Artem S. Konoplev, Maxim O. Kalinin |
| 2013 | Security through human-factors and biometrics. Sambit Bakshi, Tugkan Tuglular |
| 2013 | Security vulnerabilities and mitigation techniques of web applications. Hossain Shahriar |
| 2013 | Social access control language (SocACL). Edward Caprin, Yan Zhang, Khaled M. Khan |
| 2013 | Social engineering attacks on the knowledge worker. Katharina Krombholz, Heidelinde Hobel, Markus Huber, Edgar R. Weippl |
| 2013 | The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013 Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Oleg B. Makarevich |
| 2013 | The SHA-3 competition: lessons learned. Bart Preneel |
| 2013 | The darker side of Firefox extension. Anil Saini, Manoj Singh Gaur, Vijay Laxmi |
| 2013 | The method of the information security risk assessment in cloud computing systems. Oleg B. Makarevich, Irina V. Mashkina, Alina Sentsova |
| 2013 | Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints. Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
| 2013 | Trusting SSL in practice. Ali Aydin Selçuk |
| 2013 | Using quadrocopter as a pentest tool. Evgeny Sergeevich Abramov, Maxim Kobilev, Oleg B. Makarevich |
| 2013 | Using transition systems to model and verify the implementation of security protocol. Yulong Fu, Ousmane Koné |
| 2013 | Verification of OSPF vulnerabilities by colored Petri net. Saeid Tizpaz-Niari, Amir Hossein Jahangir |
| 2013 | Visual steganalysis of LSB-encoded audio data based on frequency domain characteristics. Yüksel Arslan, Yildiray Yalman |