Detection and analysis of eavesdropping in anonymous communication networks Sambuddho ChakravartyGeorgios PortokalidisAngelos D. Keromytis Regular Contribution 18 August 2014 Pages: 205 - 220
Analysis of two authorization protocols using Colored Petri Nets Younes SeifiSuriadi SuriadiColin Boyd Regular Contribution 03 July 2014 Pages: 221 - 247
Automated inference of past action instances in digital investigations Joshua I. JamesPavel Gladyshev Regular contribution 01 July 2014 Pages: 249 - 261
A new algorithm for low-deterministic security Dennis GiffhornGregor Snelting Regular Contribution 15 August 2014 Pages: 263 - 287
GPU-assisted malware Giorgos VasiliadisMichalis PolychronakisSotiris Ioannidis Regular Contribution 28 August 2014 Pages: 289 - 297