Regular Papers:
ATC-1
 Trung Phan Van, Minho Park and Bao Nguyen Khac. 
 A Novel Hybrid Flow-based Handler with DDoS Attacks in Software-Defined Networking
ATC-2
 Julio Bondia-Barceló, Jordi Castellà-Roca and Alexandre Viejo. 
 Building Privacy-Preserving Search Engine Query Logs for Data Monetization
ATC-3
 Robin Ankele, Kubilay Kuecuek, Andrew Martin, Andrew Simpson and Andrew Paverd. 
 Applying the Trustworthy Remote Entity to Privacy-Preserving Multiparty Computation: Requirements and Criteria for Large-Scale Applications
ATC-4
 Christophe Lohr, Philippe Tanguy and Jérôme Kerdreux. 
 Choosing security elements for the xAAL home automation system
ATC-5
 Francis Rousseaux and Pierre Saurel.
 In light of the legal debate over personal data privacy at a time of globalized Big Data
ATC-6
 Valentin Tudor, Magnus Almgren and Marina Papatriantafilou. 
 Employing Private Data in AMI Applications: Short Term Load Forecasting Using Differentially Private Aggregated Data
ATC-7
 Michael Denzel, Alessandro Bruni and Mark Ryan. 
 Smart-Guard: Defending User Input from Malware
ATC-8
 Till Neudecker, Philipp Andelfinger and Hannes Hartenstein. 
 Timing Analysis for Inferring the Topology of the Bitcoin Peer-to-Peer Network
ATC-9
 Pierrick Marie, Thierry Desprats, Sophie Chabridon and Michelle Sibilla. 
 Enabling self-configuration of QoC-centric fog computing entities
ATC-10
 Hagen Lauer and Nicolai Kuntze. 
 Hypervisor-based Attestation of Virtual Environments
ATC-11
 Andrea De Salve, Barbara Guidi, Paolo Mori and Laura Ricci. 
 Distributed Coverage of Ego networks in F2F Online Social Networks
ATC-12
 Deng Zhao and Zhangbing Zhou. 
 Multi-Application Query Optimization for Shared WSNs Leveraging Caching Mechanism
ATC-13
 Weilong Ding, Zhuofeng Zhao and Yanbo Han. 
 An Adaptive Replica Mechanism for Real-time Stream Processing
ATC-14
 Martin Harrigan. 
 The Unreasonable Effectiveness of Address Clustering
ATC-15
 Christopher Jämthagen and Martin Hell. 
 Blockchain-based publishing layer for the Keyless Signing Infrastructure
ATC-16
 Shayan Eskandari, Jeremy Clark and Abdelwahab Hamou-Lhadj. 
 Buy your coffee with Bitcoin: Real-World Deployment of Bitcoin Point of Sale
ATC-17
 Alessandro Sforzin, Felix Gomez Marmol, Mauro Conti and Jens-Matthias Bohli. RPiDS: 
 Raspberry Pi IDS A Fruitful Intrusion Detection System for IoT
ATC-18
 Amit Biswas and Animesh Dutta. 
 A Timer Based Leader Election Algorithm
ATC-19
 Sana Hamdi, Alda Lopes Gancarsk, Amel Bouzeghoub and Sadok Ben Yahia. 
 A new fuzzy clustering approach for reputation management in OSNs
ATC-20
 Ayad Al-Adhami, Marcel Ambroze, Colin Cristopher, Ingo Stengel and Martin Tomlinson. 
 A quorum system for distributing RFID tags
ATC-21
 Zahra Hosseini and Zeinab Movahedi. 
 A Green Trust Management Scheme to Mitigate Trust-distortion Attacks on MANETs
ATC-22
 Chengming Qi, Zhangbing Zhou, Qun Wang and Lishuan Hu. 
 A Framework of Multiple Kernel Ensemble Learning for Hyperspectral Classification
ATC-23
 Tao Ban, Shaoning Pang, Masashi Eto, Daisuke Inoue, Koji Nakao and Runhe Huang. 
 Towards Early Detection of Novel Attack Patterns from the Lens of A Large-Scale Darknet
ATC-24
 Takafumi Tanaka, Hiroaki Hashiura, Atsuo Hazeyama, Seiichi Komiya, Yuki Hirai and Keiichi Kaneko. 
 A Method for Collecting Learners' Thinking Process in ER Modeling Exercises and Its Application Experiment
ATC-25
 Rumiko Kurita, Morigen Darai, Motoo Kusano, Masamitu Kiuchi and Cha Su Aie. 
 A System for Facilitating the Discussions in Business Simulation Exercises Based on the Dual Advising Model
ATC-26
 Kazuhiko Sato, Suresh Shrestha, Pramesh Shrestha and Bishnu Prasad Gautam. 
Implementation of Collaborative E-learning System for Unstable Environment
ATC-27
 Hiroki Nakayama, Kodai Yamamoto, Katsunori Ogane, Hiroaki Kaminaga, Shoichi Nakamura and Youzou Miyadera. Estimation of the Error Factors in Programming Exercises Based on the Dynamic Revision of Case-base
ATC-28
 Shoichi Nakamura, Ryo Onuma, Hiroki Nakayama, Tomohiro Funayama and Youzou Miyadera. 
 Hybrid Analysis of Audience Gaze and Constitutive Features of Slides for Extracting the Defective Portions from Presentation Slides