| 2015 | A classification framework for distinct cyber-attacks based on occurrence patterns. Malik S. K. Awan, Mohammed A. AlGhamdi, Sultan H. Almotiri, Pete Burnap, Omer F. Rana |
| 2015 | A dynamic marking method for implicit information flow in dynamic taint analysis. Xuefei Wang, Hengtai Ma, Lisha Jing |
| 2015 | A graph-based data mining approach to preventing financial fraud: a case study. Margarita Knyazeva, Alexander N. Tselykh, Alexey A. Tselykh, Elena Popkova |
| 2015 | A honeypot-driven cyber incident monitor: lessons learned and steps ahead. Emmanouil Vasilomanolakis, Shankar Karuppayah, Panayotis Kikiras, Max Mühlhäuser |
| 2015 | A new algorithm for unkeyed jam resistance. Hamid Hanifi, Leemon C. Baird III, Ramakrishna Thurimella |
| 2015 | A perfect dynamic-id and biometric based remote user authentication scheme under multi-server environments using smart cards. Subhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia |
| 2015 | A robust dynamic analysis system preventing SandBox detection by Android malware. Jyoti Gajrani, Jitendra Sarswat, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti |
| 2015 | Absolute key variation technique of automatic variable key in cryptography. Rajat Subhra Goswami, Subhasish Banerjee, Manash Pratim Dutta, Chandan Tilak Bhunia |
| 2015 | Access control model D-TBAC subject to the requirements to tasks' performing. Sergey Lapin |
| 2015 | An analytical processing approach to supporting cyber security compliance assessment. Francesco Buccafurri, Lidia Fotia, Angelo Furfaro, Alfredo Garro, Matteo Giacalone, Andrea Tundis |
| 2015 | Analysis of the impact of ethical issues on the management of the access rights. André Rifaut, Christophe Feltus, Slim Turki, Djamel Khadraoui |
| 2015 | Application of cluster analysis for the assessment of the share of fraud victims among bank card holders. S. S. Alkhasov, Alexander N. Tselykh, Alexey A. Tselykh |
| 2015 | Approbation of the methodology for web monitoring of terrorism- and extremism-related content. Evstifeeva Natalia Alexandrovna, Evstifeeva Olga Urievna |
| 2015 | Automatic vulnerability detection for weakness visualization and advisory creation. Marian Gawron, Aragats Amirkhanyan, Feng Cheng, Christoph Meinel |
| 2015 | Building data in motion DLP system from scratch using opensource software and confirming its effectiveness within "capture the flag" competitions. Artem Garkusha |
| 2015 | Case based analysis in information security incidents management system. Andrey Shalyapin, Vadim Zhukov |
| 2015 | Comparison between safety and efficient security of the ARP protocol. Elvia León, Brayan S. Reyes Daza, Octavio J. Salcedo Parra |
| 2015 | Cryptanalysis of factoring-based fully homomorphic encryption. Ludmila K. Babenko, Alina Trepacheva |
| 2015 | Cybersecurity of ad-hoc distributed systems. Dmitry V. Moskvin, Denis Ivanov |
| 2015 | DDoS/EDoS attack in cloud: affecting everyone out there! Gaurav Somani, Manoj Singh Gaur, Dheeraj Sanghi |
| 2015 | DRACO: DRoid analyst combo an android malware analysis framework. Shweta Bhandari, Rishabh Gupta, Vijay Laxmi, Manoj Singh Gaur, Akka Zemmari, Maxim Anikeev |
| 2015 | Designing a context-aware cyber physical system for detecting security threats in motor vehicles. Andrei Petrovski, Prapa Rattadilok, Sergey Petrovski |
| 2015 | Developing a penetration test methodology in ensuring router security and testing it in a virtual laboratory. Ecir Ugur Küçüksille, Mehmet Ali Yalçinkaya, Samet Ganal |
| 2015 | Developing a system for text-messages protection. Dmitry Mikhaylov, Andrey Starikovskiy, Grigoriy Lebedev, Dmitry Rubin, Alexey Egorov, Eugeniy Uleykin, Alexander Boruchinkin, Anastasia M. Tolstaya |
| 2015 | Development of network security tools for enterprise software-defined networks. Alexander Shukhman, Petr Polezhaev, Yuri Ushakov, Leonid Legashev, Veniamin N. Tarasov, Nadezhda F. Bakhareva |
| 2015 | DynaDroid: dynamic binary instrumentation based app behavior monitoring framework. Bharat Buddhdev, Rati Bhan, Manoj Singh Gaur, Vijay Laxmi |
| 2015 | Dynamic response recognition by neural network to detect network host anomaly activity. Vladimir Eliseev, Yury Shabalin |
| 2015 | Execution of data-dependent programs over encrypted data. Philipp Burtyka, Oleg B. Makarevich |
| 2015 | Few notes towards making honeyword system more secure and usable. Nilesh Chakraborty, Samrat Mondal |
| 2015 | Hartley's test ranked opcodes for Android malware analysis. Meenu Mary John, P. Vinod, K. A. Dhanya |
| 2015 | Improved trust based key management for end-to-end secure communication in cellular networks. Naila Mukhtar, Muhammad Shamim Baig, L. A. Khan |
| 2015 | Improvement of treeless signature schemes implementation by random oracle buffering. Maxim Anikeev |
| 2015 | Information security in computer networks with dynamic topology. Alexander Minin, Maxim O. Kalinin |
| 2015 | Information security risk management in computer networks based on fuzzy logic and cost/benefit ratio estimation. Igor Anikin, Lilia Yu. Emaletdinova |
| 2015 | Information theoretic method for classification of packed and encoded files. Jithu Raphel, P. Vinod |
| 2015 | Labelled mobile ambients model for information flow security in distributed systems. N. V. Narendra Kumar, R. K. Shyamasundar |
| 2015 | Large-scale systems security evolution: control theory approach. Tatiana V. Stepanova, Dmitry P. Zegzhda |
| 2015 | Lightweight cryptography: modern development paradigms. Alexey Zhukov |
| 2015 | Machine learning approach for filtering spam emails. Princy George, P. Vinod |
| 2015 | Mathematical modelling of cryptosystems based on Diophantine problem with gamma superposition method. Valeriy O. Osipyan |
| 2015 | Mitigating conflicts of interest by authorization policies. Nezar Nassr, Eric Steegmans |
| 2015 | Modeling of next-generation firewalls as queueing services. Sergey Zapechnikov, Natalia G. Miloslavskaya, Alexander I. Tolstoy |
| 2015 | Modern techniques of function-level fault tolerance in MFM-systems. Alexander Tarasov |
| 2015 | Modern trends in the regulatory framework of the information security compliance assessment in Russia based on common criteria. Alexander Barabanov, Alexey Markov |
| 2015 | Ontology-based big data approach to automated penetration testing of large-scale heterogeneous systems. Tatiana V. Stepanova, Alexander I. Pechenkin, Daria S. Lavrova |
| 2015 | Problems of data protection in industrial corporations enterprise architecture. Vladimir V. Glukhov, Igor V. Ilin, A. B. Anisiforov |
| 2015 | Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015 Oleg B. Makarevich, Ron Poet, Atilla Elçi, Manoj Singh Gaur, Mehmet A. Orgun, Ludmila K. Babenko, Md Sadek Ferdous, Anthony T. S. Ho, Vijay Laxmi, Josef Pieprzyk |
| 2015 | Profile-based students assignment to core financial intelligence unit departments. Daria Chukova, Alexey Pakhomov |
| 2015 | Protection from binary and multi-symbol packet length covert channels. Anna Epishkina, Konstantin Kogos |
| 2015 | Record linkage applications in health services research: opportunities and challenges. Ramakrishna Thurimella, Rinku Dewri, William Mitchell |
| 2015 | SQL-IDS: evaluation of SQLi attack detection and classification based on machine learning techniques. Naghmeh Moradpoor Sheykhkanloo |
| 2015 | Secure e-Learning portal for teaching business continuity and information security management. Natalia G. Miloslavskaya, Alexander I. Tolstoy, Vladislav Petrov |
| 2015 | Secure voice communication system with hardware encryption of data on hands-free headset. A. Yu. Boruchinkin |
| 2015 | Simulation user behavior on a security testbed using user behavior states graph. Aragats Amirkhanyan, Andrey Sapegin, Marian Gawron, Feng Cheng, Christoph Meinel |
| 2015 | Steganographic methods of communications in distributed computing networks. Artem S. Konoplev, Alexey G. Busygin |
| 2015 | Synthesis of secure software development controls. Alexander Barabanov, Alexey Markov, Andrey Fadin, Valentin Tsirlov, Igor Shakhalov |
| 2015 | The general model of secure computation system. Ludmila K. Babenko, Philipp Burtyka, Oleg B. Makarevich, Alina Trepacheva |
| 2015 | The use of mobile devices in authentication. Ron Poet |
| 2015 | Towards proactive detection of advanced persistent threat (APT) attacks using honeypots. Zainab Saud, M. Hasan Islam |
| 2015 | Trust management system for mobile cluster-based wireless sensor network. Evgeny Sergeevich Abramov, Elena Basan, Oleg B. Makarevich |
| 2015 | Two formal problems of network security and a theory of boolean-valued flow networks. Evgeny Shcherba |
| 2015 | Web service for detecting credit card fraud in near real-time. Alexey A. Tselykh, Dmitry Petukhov |
| 2015 | sandFOX: secure sandboxed and isolated environment for firefox browser. Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Priyadarsi Nanda |