Tendrils of Crime: Visualizing the Diffusion of Stolen Bitcoins.- Deciding the Non-Emptiness of Attack trees.- Combining Bayesian Networks and Fishbone Diagrams to Distinguish Between Intentional Attacks and Accidental Technical Failures.- Disclosure Analysis of SQL Workflows.- On Linear Logic, Functional Programming, and Attack Trees.- The Attacker Does Not Always Hold the Initiative: Attack Trees with External Refinement.- A State Machine System for Insider Threat Detection.