{"title":"Protecting Android Apps Against Reverse Engineering by the Use of the Native Code","authors":"Mykola Protsenko, Tilo Müller","doi":"10.1007/978-3-319-22906-5_8","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_8","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing Privacy-Aware Systems in the Cloud","authors":"Christos Kalloniatis","doi":"10.1007/978-3-319-22906-5_9","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_9","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129099007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Efficacy of Static Features to Detect Malicious Applications in Android","authors":"D. Geneiatakis, R. Satta, I. N. Fovino, R. Neisse","doi":"10.1007/978-3-319-22906-5_7","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_7","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132562877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Colantonio, R. D. Pietro, M. Petrocchi, A. Spognardi
{"title":"VISIO: A Visual Approach for Singularity Detection in Recommendation Systems","authors":"A. Colantonio, R. D. Pietro, M. Petrocchi, A. Spognardi","doi":"10.1007/978-3-319-22906-5_3","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_3","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126867907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. A. Abdulwahid, N. Clarke, I. Stengel, S. Furnell, C. Reich
{"title":"Security, Privacy and Usability - A Survey of Users' Perceptions and Attitudes","authors":"A. A. Abdulwahid, N. Clarke, I. Stengel, S. Furnell, C. Reich","doi":"10.1007/978-3-319-22906-5_12","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_12","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133618513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Taxonomy of Requirements for the Privacy Goal Transparency","authors":"Rene Meis, Roman Wirtz, M. Heisel","doi":"10.1007/978-3-319-22906-5_15","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_15","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Horcas, M. Pinto, L. Fuentes, Wissam Mallouli, Edgardo Montes de Oca
{"title":"Dynamic Deployment and Monitoring of Security Policies","authors":"J. Horcas, M. Pinto, L. Fuentes, Wissam Mallouli, Edgardo Montes de Oca","doi":"10.1007/978-3-319-22906-5_14","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_14","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125160217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy Preserving Framework for Big Data in e-Government Environments","authors":"Prokopios Drogkaris, Aristomenis Gritzalis","doi":"10.1007/978-3-319-22906-5_16","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_16","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127923963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Design of a Configurable Reputation Service","authors":"C. Hillebrand, M. Coetzee","doi":"10.1007/978-3-319-22906-5_5","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_5","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"228 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132187265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zisis Tsiatsikas, M. Anagnostopoulos, G. Kambourakis, Sozon Lambrou, D. Geneiatakis
{"title":"Hidden in Plain Sight. SDP-Based Covert Channel for Botnet Communication","authors":"Zisis Tsiatsikas, M. Anagnostopoulos, G. Kambourakis, Sozon Lambrou, D. Geneiatakis","doi":"10.1007/978-3-319-22906-5_4","DOIUrl":"https://doi.org/10.1007/978-3-319-22906-5_4","url":null,"abstract":"","PeriodicalId":171055,"journal":{"name":"Trust and Privacy in Digital Business","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128629829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}