H. Jeong, J. Choi, C. Choi, and .. , Ilsun You, and Pankoo Kim Motivation-Based Risk Analysis Process for IT Systems, p.446

A. Niescieruk and B. , Ksiezopolski Formalizing Information Flow Control in a Model-Driven Approach, p.456

K. Stenzel, K. Katkalov, M. Borek, and W. , Reif Security Assessment of Computer Networks Based on Attack Graphs and Security Events, p.462

I. Kotenko and E. Doynikova, Pipeline Optimization Model for QKD Post-processing System, p.472

J. Zhou, B. Liu, and .. , Baokang Zhao, and Bo Liu Privacy and Trust Management Aggregation of Network Protocol Data Near Its Source, p.482

R. Marek, L. Ogiela, and .. Ogiela, 526 Bogdan Ksiezopolski, Adam Wierzbicki, and Damian Rusinek Cryptography Efficient Variant of Rainbow without Triangular Matrix Representation, p.532

K. Singh, C. Pandu-rangan, A. K. S-boxes, and .. , Banerjee An Algorithm to Analyze Non-injective, p.576

F. Shao, R. Cheng, and .. , and Fangguo Zhang Implementation of Efficient Operations over GF (2 32 ) Using Graphics Processing Units, p.602

T. Jiang, X. Chen, J. L. , and .. , Jianfeng Ma Table of Contents XXI Multimedia Security High-Quality Reversible Data Hiding Approach Based on Evaluating Multiple Prediction Methods, p.622

C. Yang, K. Liu, C. Chang, and Y. , 633 Ya-Ting Chang, Min-Hao Wu, and Shiuh-Jeng Wang Experimental Evaluation of an Algorithm for the Detection of, Tampered JPEG Images, p.643

G. Cattaneo, G. Roscigno, and U. , Ferraro Petrillo Dependable Systems and Applications A Semantic-Based Malware Detection System Design Based on Channels, p.653

P. Ren, X. Wang, C. Wu, and .. , Baokang Zhao, and Hao Sun An Efficient Semantic-Based Organization and Similarity Search Method for Internet Data Resources, p.663

P. Ren, X. Wang, and H. Sun, Baokang Zhao, and Chunqing Wu Efficient DVFS to Prevent Hard Faults for Many-Core Architectures, p.674