• Detecting deceptive reviews using Argumentation – Oana Cocarascu and Francesca Toni
  • Defending Cyber-Physical Attacks on Oil Pipeline Systems: A Game-Theoretic Approach – Yatin Wadhawan and Clifford Neuman
  • Using Genetic Algorithms for Design and Reconfiguration of RBAC Schemes – Igor Saenko and Igor Kotenko
  • A Genetic Algorithm Approach to Synthetic Data Production – Yingrui Chen, Mark Elliot and Joseph Sakshaug (short paper)
  • Strategies for Privacy Negotiation in Online Social Networks – Dilara Keküllüoğlu, Nadin Kokciyan and Pinar Yolum
  • Learning Privacy Rules Cooperatively in Online Social Networks – Berkant Kepez and Pinar Yolum (short paper)
  • Towards a general record linkage framework for statistical disclosure control – Duncan Smith and Mark Elliot
  • Detecting the Behavioral Relationships of Malware Connections – Sebastián García and Michal Pechoucek
  • Expressing Receipt-Freeness and Coercion-Resistance in Logics of Strategic Ability: Preliminary Attempt – Masoud TabatabaeiWojtek Jamroga and Peter Y. A. Ryan
  • Representing sequences of actions in access control security policies – Salem Benferhat, Mouslim Tolba, Tabia Karim and Abdelkader Belkhir (short paper)
  • Data set operations to hide decision tree rules – Dimitris Kalles, Vassilios S. Verykios, Georgios Feretzakis and Athanasios Papagelis
  • Secure Multi-Agent Planning – Michal Štolba, Jan Tožička and Antonín Komenda
  • Using a Deep Understanding of Network Activities for Network Vulnerability Assessment – Mona Lange, Felix Kuhr and Ralf Möller