A. Holzinger, M. Schwarz, B. Ofner, F. Jeanquartier, and S. , Andre Calero-Valdez, Carsten Roecker, and Martina Ziefle Semantic-Aware Mashups for Personal Resources in SemanticLIFE, 138 Sao-Khue Vo, Amin Anjomshoaa, and A. Min Tjoa 4th International Workshop on Security and Cognitive Informatics for Homeland Defense, 2014.

J. Antonio, Jara Building an Initialization Cipher Block with Two-Dimensional Operation and Random Parameters, p.166

A. Plateaux, P. Lacharme, and .. , Audun Jøsang, and Christophe Rosenberger Expert Knowledge Based Design and Verification of Secure Systems with Embedded Devices

V. Desnitsky and I. , A Efficient Data Anonymization Tool Based on Scoring Functions, 211 Shinsaku Kiyomoto and Yutaka Miyake Detection of Malicious Web Pages Using System Calls Sequences . . . . . . . 226

G. Canfora, E. Medvet, and .. , Corrado Aaron Visaggio Risk Reduction Overview: A Visualization Method for Risk Management, p.239

H. Nanda, J. Havinga, and O. , Diederik Theobald Sessink Towards Analysis of Sophisticated Attacks, with Conditional Probability, Genetic Algorithm and a Crime Function, p.250

H. Qian, Z. Baokang, L. Yunjian, S. Jinshu, and .. , and Ilsun You Amplification DDoS Attacks: Emerging Threats and Defense Strategies, p.298