The automatic Trust Management of self-adaptive Multi-Display Environments.- Malicious Pixels - Using QR Codes as Attack Vector.- A Virtual Performance Stage as a Space for Children to Create and Perform Stories.- Network Forensics: Detection and Mitigation of Botnet and Malicious Code via Darknet.- Trusted Log Management System.- Reasoning of Collaborative Human Behaviour in Security-Critical Work Practices: A Framework.- Mitigation ofWormhole...