R. Islam, I. Altas, and M. , Saiful Islam Screening Smartphone Applications Using Behavioral Signatures, p.14

S. Lee, J. Lee, and .. , and Heejo Lee Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention, p.28

T. Spyridopoulos, G. Oikonomou-internet, and .. , Theo Tryfonas, and Mengmeng Ge Authentication and Authorization Evolving a Secure, p.42

W. J. Caelli, . Lam-for, and D. Kwok, Longley Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones, p.55

S. Kirrane, A. Mileo, S. Decker, and A. , Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error, p.83

T. Hoang, D. Choi, V. Vo, A. Nguyen, T. Nguyen et al., 102 Sarah Abughazalah, Konstantinos Markantonakis, and Keith Mayes Network Security/ Cryptography Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation, p.125

E. Chai-wen-chuah and .. Dawson, and Leonie Simpson XII Table of Contents Sustainable Pseudo-random Number Generator, p.139

A. Armando, A. Merlo, and L. , Verderame A Security Engineering Process Approach for the Future Development of Complex Aircraft Cabin Systems

M. Assaf, J. Signoles, and .. , Frédéric Tronel, andÉricand´andÉric Totel Policy Compliance and Obligations A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System, p.245

G. Ezzat-alqurashi, L. Wills, and .. Gilbert, Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance, p.257

H. Hobel, J. Heurix, A. Anjomshoaa, and E. , Weippl On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud, 300 Bernd Zwattendorfer and Daniel Slamanig Risk Analysis and Security Metrics Using the Conflicting Incentives Risk Analysis Method, p.315

L. Rajbhandari and E. , Snekkenes Performance Analysis of Scalable Attack Representation Models, p.330

C. B. Simmons, S. G. Shiva, H. Singh-bedi, V. , O. Learning et al., Shandilya Social Engineering Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails, p.379

H. Lotfi-ben-othmane, R. Weffers, and .. Ranchal, Forensic Secure Outsourcing: An Investigation of the Fit between Clients and Providers, 405 Gurpreet Dhillon, Romilla Chowdhuri, and Filipe de Sá-Soares Performance Analysis of File Carving Tools . . . . . . . . . . . . . . . . . . . . . . . . . 419 Thomas Laurenson