Client Side Localization of BGP Hijack Attacks with a Quasi-realistic Internet Graph.- Ka-band High Throughput Satellites for 5G based Applications: The Athena-Fidus Case Study.- Approaches to Securing P2PSIP in MANETs.- How Marketers Can Induce Consumer Awareness and Interactions in Facebook Brand Pages? - Drivers and Outcomes.- How to Manage and Model Unstructured Business Processes: A Proposed List of Representational Requirements.- Optical MIMO Transmission Focusing on Photonic Lanterns and Optical Couplers.- BoolTest: The Fast Randomness Testing Strategy based on Boolean Functions with Application to DES, 3-DES, MD5, MD6 and SHA-256.- Resistance of the Point Randomisation Countermeasure for Pairings against Side-Channel Attack.- On the Relation between SIM and IND-RoR Security Models for PAKEs with Forward Secrecy.- History-based Throttling of Distributed Denial-of-Service Attacks.- LocalPKI: An Interoperable and IoT Friendly PKI.- No Such Thing as a Small Leak: Leakage-abuse Attacks against Symmetric Searchable Encryption.- Computer-based Analysis of Tomatis Listening Test System Audio Data.- Optimising Link Quality for Throughput Enhancement in Wireless Sensor Networks.- BiPS - A Real-time-capable Protocol Framework for Wireless Networked Control Systems and Its Application.- Using Risk Assessments to Assess Insurability in the Context of Cyber Insurance.- Reliability, Fault Tolerance and other Critical Components for Survivability in Information Warfare.