Forecasting Unknown Internet Worms Using Randomness Analysis, p.376 ,
Heejo Lee, and Hoh Peter In Incentive Compatible Moving Target Defense against VM-Colocation Attacks in Clouds, 388 Yulong Zhang ,
A Trust-Based Institutional Online Supplier Recommendation Framework, p.400 ,
Jiuyong Li, and Chengfei Liu Security Economics A Game-Theoretic Formulation of Security Investment Decisions under Ex-ante Regulation, p.412 ,
and Maurizio Naldi Optimizing Network Patching Policy Decisions, p.424 ,
Alexios Mylonas, and Dimitris Gritzalis Empirical Benefits of Training to Phishing Susceptibility, p.457 ,
Furnell Analysis and Modeling of False Synchronizations in 3G 475 Christoforos Ntantogian, Christos Xenakis, and Ioannis Stavrakakis Password Protected Smart Card and Memory Stick Authentication against Off-Line Dictionary Attacks, p.489 ,
Thing and Hwei-Ming Ying Table of Contents XV Short Papers Authorization Policies for Materialized Views, p.525 ,
531 Yongdong Wu and Zhigang Zhao Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach, p.537 ,
555 Milica Milutinovic, Vincent Naessens, and Bart De Decker Web Services Security Assessment: An Authentication-Focused Approach 561 Yannis Soupionis and Miltiadis Kandias Open Issues and Proposals in the IT Security Management of Commercial Ports: The S-PORT National Case, p.567 ,