| 2018 | A Comprehensive Methodology for Deploying IoT Honeypots. Antonio Acien, Ana Nieto, Gerardo Fernandez, Javier López |
| 2018 | A Decision-Making Approach for Improving Organizations' Cloud Forensic Readiness. Stavros Simou, Ioannis Troumpis, Christos Kalloniatis, Dimitris Kavroudakis, Stefanos Gritzalis |
| 2018 | Access Control Requirements for Physical Spaces Protected by Virtual Perimeters. Brian Greaves, Marijke Coetzee, Wai Sze Leung |
| 2018 | An Enhanced Cyber Attack Attribution Framework. Nikolaos Pitropakis, Emmanouil Panaousis, Alkiviadis Giannakoulias, George Kalpakis, Rodrigo Diaz Rodriguez, Panayiotis Sarigiannidis |
| 2018 | An Inquiry into Perception and Usage of Smartphone Permission Models. Lena Reinfelder, Andrea Schankin, Sophie Russ, Zinaida Benenson |
| 2018 | Biometrically Linking Document Leakage to the Individuals Responsible. Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell |
| 2018 | Can Spatial Transformation-Based Privacy Preservation Compromise Location Privacy? Anand Paturi, Subhasish Mazumdar |
| 2018 | Developing and Evaluating a Five Minute Phishing Awareness Video. Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, Philipp Rack, Marco Ghiglieri, Peter Mayer, Alexandra Kunz, Nina Gerber |
| 2018 | Evaluating the Privacy Properties of Secure VoIP Metadata. João S. Resende, Patrícia R. Sousa, Luís Antunes |
| 2018 | On the Hardness of Separation of Duties Problems for Cloud Databases. Ferdinand Bollwein, Lena Wiese |
| 2018 | PERSUADED: Fighting Social Engineering Attacks with a Serious Game. Dina Aladawy, Kristian Beckers, Sebastian Pape |
| 2018 | The General Data Protection Regulation (GDPR) Era: Ten Steps for Compliance of Data Processors and Data Controllers. Costas Lambrinoudakis |
| 2018 | Three Tales of Disillusion: Benchmarking Property Preserving Encryption Schemes. Frank Pallas, Martin Grambow |
| 2018 | Towards Blockchain-Based Identity and Access Management for Internet of Things in Enterprises. Martin Nuss, Alexander Puchta, Michael Kunz |
| 2018 | Towards an Effective Privacy Impact and Risk Assessment Methodology: Risk Assessment. Majed Alshammari, Andrew Simpson |
| 2018 | Towards the Definition of a Security Incident Response Modelling Language. Myrsini Athinaiou, Haralambos Mouratidis, Theo Fotis, Michalis Pavlidis, Emmanouil Panaousis |
| 2018 | Trust, Privacy and Security in Digital Business - 15th International Conference, TrustBus 2018, Regensburg, Germany, September 5-6, 2018, Proceedings Steven Furnell, Haralambos Mouratidis, Günther Pernul |
| 2018 | Trustworthiness Cases - Toward Preparation for the Trustworthiness Certification. Nazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel |