| 2014 | A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems. Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham |
| 2014 | A New Perspective to Information Security: Total Quality Information Security Management. Mehrdad Sepehri Sharbaf |
| 2014 | A Novel Authentication Scheme for Online Transactions. Paraskevas Sarris, Lewis Mackenzie, Soumyadeb Chowdhury |
| 2014 | A Privacy-Preserving E-Ticketing System for Public Transportation Supporting Fine-Granular Billing and Local Validation. Ivan Gudymenko |
| 2014 | A Protocol For Storage Limitations and Upgrades in Decentralised Networks. Greig Paul, James Irvine |
| 2014 | A Small Data Approach to Identification of Individuals on the Transport Layer using Statistical Behaviour Templates. Sebastian Abt, Sebastian Gärtner, Harald Baier |
| 2014 | An Approach of Privacy Preserving based Publishing in Twitter. Amardeep Singh, Divya Bansal, Sanjeev Sofat |
| 2014 | An Empirical Study of Smartphone Based Iris Recognition in Visible Spectrum. Kiran B. Raja, Ramachandra Raghavendra, Christoph Busch, Soumik Mondal |
| 2014 | An ID and Address Protection Unit for NoC based Communication Architectures. Ahmed Saeed, Ali Ahmadinia, Mike Just, Christophe Bobda |
| 2014 | An Order Preserving Encryption Scheme for Cloud Computing. Vikas Jaiman, Gaurav Somani |
| 2014 | An effectiveness of application of <<Capture The Flag>> competitions concept within higher education (Student contribution). Artem Garkusha, Evgeny Sergeevich Abramov, Oleg B. Makarevich |
| 2014 | Analysing Security requirements in Cloud-based Service Level Agreements. Yogachandran Rahulamathavan, Pramod S. Pawar, Pete Burnap, Muttukrishnan Rajarajan, Omer F. Rana, George Spanoudakis |
| 2014 | Analysis of Identity Forging Attack in MANETs. Nishant Garg, Kuldeep Pareek, Manoj Singh Gaur, Vijay Laxmi, Chhagan Lal |
| 2014 | Analyzing the Effectiveness of DoS Attacks on Tor. Bernd Conrad, Fatemeh Shirazi |
| 2014 | Applying Large-scale Adaptive Graphs to Modeling Internet of Things Security. Tatiana V. Stepanova, Dmitry P. Zegzhda |
| 2014 | Automated Session Fixation Vulnerability Detection in Web Applications using the Set-Cookie HTTP response header in cookies. Rahul Kumar, Indraveni K, Aakash Kumar Goel |
| 2014 | Autonomic management for convergent networks to support robustness of appliance technologies. Ahmad Kamal Ramli, Karim Djemame |
| 2014 | Bandwidth-Optimized Parallel Private Information Retrieval. Ecem Ünal, Erkay Savas |
| 2014 | Big Data Information Security Maintenance. Natalia G. Miloslavskaya, Mikhail Senatorov, Alexander I. Tolstoy, Sergey Zapechnikov |
| 2014 | CBR Clone Based Software Flaw Detection Issues. Ali Reza Honarvar, Ashkan Sami |
| 2014 | Challenges in developing Capture-HPC exclusion lists. Mohammad Puttaroo, Peter Komisarczuk, Renato Cordeiro de Amorim |
| 2014 | Classification of PE Files using Static Analysis. Ashish Saini, Ekta Gandotra, Divya Bansal, Sanjeev Sofat |
| 2014 | Compliance with standards, assurance and audit: does this equal security? Bob Duncan, Mark Whittington |
| 2014 | Content Provider Leakage Vulnerability Detection in Android Applications. Hossain Shahriar, Hisham M. Haddad |
| 2014 | Continuous Authentication using Fuzzy Logic. Soumik Mondal, Patrick Bours |
| 2014 | Cryptanalysis of Polynomial based Homomorphic Encryption. Alina Trepacheva |
| 2014 | Current Trends and the Future of Metamorphic Malware Detection. Shahid Alam, Issa Traoré, Ibrahim Sogukpinar |
| 2014 | Deploying Suitable Countermeasures to Solve the Security Problems within an E-learning Environment. Neila Rjaibi, Latifa Ben Arfa Rabai |
| 2014 | Design and Analysis of a New Hash Function Gear. Mohammad A. AlAhmad, Imad Fakhri Alshaikhli |
| 2014 | Detecting Malicious Users in Twitter using Classifiers. Monika Singh, Divya Bansal, Sanjeev Sofat |
| 2014 | Development of a Threat Model for Vehicular Ad-hoc Network based Accident Warning Systems. Niaz Morshed Chowdhury, Lewis M. Mackenzie |
| 2014 | Differential Fault Analysis for Block Ciphers: an Automated Conservative Analysis. Giovanni Agosta, Alessandro Barenghi, Gerardo Pelosi, Michele Scandale |
| 2014 | Dynamic Analysis of Web Objects. Komminist Weldemariam, Hossain Shahriar, Vamshee Krishna Devendran |
| 2014 | Educated Guessing Attacks on Culturally Familiar Graphical Passwords Using Personal Information on Social Networks. Hani Moaiteq Aljahdali, Ron Poet |
| 2014 | Efficient Protection of Response Messages in DTLS-Based Secure Multicast Communication. Marco Tiloca |
| 2014 | Employing Neural Networks for the Detection of SQL Injection Attack. Naghmeh Moradpoor Sheykhkanloo |
| 2014 | Exploring Worm Behaviors using DTW. Smita Naval, Vijay Laxmi, Neha Gupta, Manoj Singh Gaur, Muttukrishnan Rajarajan |
| 2014 | Exploring the Guessability of Image Passwords. Soumyadeb Chowdhury, Ron Poet, Lewis Mackenzie |
| 2014 | Framework for distributed virtual honeynets. Peter Pisarcík, Pavol Sokol |
| 2014 | GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing. Xavier J. A. Bellekens, Christos Tachtatzis, Robert C. Atkinson, Craig Renfrew, Tony Kirkham |
| 2014 | Group Key Exchange Protocol Based on Diffie-Hellman Technique in Ad-Hoc Network. Maryam Farajzadeh-Zanjani, Seyed Masoud Alavi Abhari, Alexander G. Chefranov |
| 2014 | HISEC: A New Lightweight Block Cipher Algorithm. Sufyan Salim Mahmood AlDabbagh, Imad Fakhri Taha Al Shaikhli, Mohammad A. AlAhmad |
| 2014 | HosTaGe: a Mobile Honeypot for Collaborative Defense. Emmanouil Vasilomanolakis, Shankar Karuppayah, Max Mühlhäuser, Mathias Fischer |
| 2014 | Human Visualisation of Cryptographic Code Using Progressive Multi-Scale Resolution. Alwyn Goh, Geong Sen Poh, Voon-Yee Vee, Kok Boon Chong, Xin Zhe Khooi, Chanan Zhuo Ern Loh, Zhi Yuan Eng |
| 2014 | Identification and Detection of Phishing Emails Using Natural Language Processing Techniques. Shivam Aggarwal, Vishal Kumar, S. D. Sudarsan |
| 2014 | Implementation Aspects of MeterGoat, a Smart Meter Security Training Platform. Parth Bhatt, Johny de Souza, Nelson Uto, Jefferson Capovilla, Jose Resende, Danilo Suiama |
| 2014 | Implementation of Safety Techniques in a Cyber Domain. Maria Evangelopoulou, Christopher W. Johnson |
| 2014 | Implementation of an Adaptive Traffic-aware Firewall. Ashok Singh Sairam, Rahul Kumar, Pratima Biswas |
| 2014 | Improbable Differential Attacks on Serpent using Undisturbed Bits. Cihangir Tezcan, Halil Kemal Taskin, Murat Demircioglu |
| 2014 | In-Cloud Malware Analysis and Detection: State of the Art. Shahid Alam, Ibrahim Sogukpinar, Issa Traoré, Yvonne Coady |
| 2014 | Information Security Theory Development. Anatoly Malyuk, Natalia G. Miloslavskaya |
| 2014 | Instrumental System for Analysis of Information Systems Using Smart Cards Protection. Ludmila K. Babenko, Oleg B. Makarevich, Dmitry Bespalov, Roman Chesnokov, Yaroslav Trubnikov |
| 2014 | Integrated Framework for Classification of Malwares. Ekta Gandotra, Divya Bansal, Sanjeev Sofat |
| 2014 | Intrusion Detection System for Cloud Environment. Hifaa Bait Baraka, Huaglory Tianfield |
| 2014 | Isn't the Time Ripe for a Standard Ontology on Security of Information and Networks? Atilla Elçi |
| 2014 | Known Plaintexts Attack on Polynomial based Homomorphic Encryption. Alina Trepacheva, Liudmila Babenko |
| 2014 | Location Identity Based Content Security Scheme for Content Centric Networking. Fawad Khan, Sarmad Ullah Khan, Muhammad Roman, Muhammad Usman Abbasi |
| 2014 | Managing Mobile Device Security in Critical Infrastructure Sectors. Chalee Vorakulpipat, Chantri Polprasert, Siwaruk Siwamogsatham |
| 2014 | MapReduce: MR Model Abstraction for Future Security Study. Ibrahim Lahmer, Ning Zhang |
| 2014 | Mathematical Modelling of Identity, Identity Management and Other Related Topics. Md Sadek Ferdous, Gethin Norman, Ron Poet |
| 2014 | Mathematical model of the polyalphabetic information security system based on the normal generalized knapsack. Valeriy O. Osipyan |
| 2014 | Memory access time as entropy source for RNG. Sergey Agafin, Anton Krasnopevtsev |
| 2014 | Negotiation Based Framework for Attribute-Based Access Control Policy Evaluation. Edward Caprin, Yan Zhang |
| 2014 | Non-cryptographic Detection Approach and Countermeasure for JFDV Attack. Avani Sharma, Rajbir Kaur |
| 2014 | On the Possibility of Insider Threat Detection Using Physiological Signal Monitoring. Abdulaziz Almehmadi, Khalil El-Khatib |
| 2014 | Physical Dangers in the Cyber Security and Precautions to be Taken. Ecir U. Küçüksille, Mehmet Ali Yalçinkaya, Ozan Uçar |
| 2014 | Plugin in the Middle - Minimising Security Risks in Mobile Middleware Implementations. Peter Aufner, Georg Merzdovnik, Markus Huber, Edgar R. Weippl |
| 2014 | Privacy Implications of Wearable Health Devices. Greig Paul, James Irvine |
| 2014 | Proceedings of the 7th International Conference on Security of Information and Networks, Glasgow, Scotland, UK, September 9-11, 2014 Ron Poet, Muttukrishnan Rajarajan |
| 2014 | Reverse Engineering of ARM Binaries Using Formal Transformations. Tobias F. Pfeffer, Paula Herber, Jörg Schneider |
| 2014 | Sector-Specific Tool for Information Security Risk Management in the Context of Telecommunications Regulation (Tool demo). Nicolas Mayer, Jocelyn Aubert |
| 2014 | Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster). Hui Lin, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer |
| 2014 | Symmetric Fully Homomorphic Encryption Using Decidable Matrix Equations. Philipp Burtyka, Oleg B. Makarevich |
| 2014 | The Botnet Revenue Model. Giovanni Bottazzi, Gianluigi Me |
| 2014 | The Uncertainty of Identity Toolset: Analysing Digital Traces for User Profiling. Muhammad Adnan, Antonio Lima, Luca Rossi, Suresh Veluru, Paul A. Longley, Mirco Musolesi, Muttukrishnan Rajarajan |
| 2014 | Towards Practical Methods to Protect the Privacy of Location Information with Mobile Devices. Christoph Hochreiner, Markus Huber, Georg Merzdovnik, Edgar R. Weippl |
| 2014 | Towards a HL7 based Metamodeling Integration Approach for Embracing the Privacy of Healthcare Patient Records Administration. Christophe Feltus, Damien Nicolas, Claude Poupart |
| 2014 | Towards an Innovative Systemic Approach of Risk Management. Hervé Cholez, Christophe Feltus |
| 2014 | Towards the Detection of Undetectable Metamorphic Malware. Jikku Kuriakose, Vinod P. |
| 2014 | Traversing symmetric NAT with predictable port allocation. Dusan Klinec, Vashek Matyás |
| 2014 | Trustworthiness of Identity Attributes. Brian A. Soeder, K. Suzanne Barber |
| 2014 | Users' Perceptions of Recognition-Based Graphical Passwords: A Qualitative Study on Culturally Familiar Graphical Passwords. Hani Moaiteq Aljahdali, Ron Poet |
| 2014 | Virtual Machine Introspection. Thu Yein Win, Huaglory Tianfield, Quentin Mair, Taimur Al Said, Omer F. Rana |