researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2017
2018
2019
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Anna Pia Lohfink
Anze Mihelic
Blaz Markelj
Bogdan Groza
Daniel Spiekermann
Felix C. Freiling
Gabriele Lenzini
Hans Dieter Schotten
Igor Bernik
Igor Tomicic
Ina Schiering
Jörg Keller 0001
Kaja Prislan
Maksim Goman
Miroslav Baca
Pal-Stefan Murvay
Peter Y. A. Ryan
Petra Grd
Simon L. R. Vrhovec
Ziya Alper Genç
Filter by Top terms
[+]
OR
AND
NOT
1
access
analysis
android
attacks
case
cecc
central
control
cybersecurity
data
detection
industrial
mobile
networks
proceedings
process
protection
security
software
systems
CECC (cecc)
Editions
Publications
Viewing Publication 1 - 63 from 63
2019
CECC, Proceedings
2019.
Proceedings of the Third Central European Cybersecurity Conference, CECC 2019, Munich, Germany, November 14-15, 2019
ACM,
2019.
[doi]
Achieving Consistency of Software Updates against Strong Attackers
Lamya Abdullah
,
Sebastian Hahn
,
Felix C. Freiling
.
cecc 2019
:
[doi]
Multi-Platform Authorship Verification
Abdulaziz Altamimi
,
Nathan L. Clarke
,
Steven Furnell
,
Fudong Li
.
cecc 2019
:
[doi]
A Secure String Class Compliant with PCI DSS
Katarína Amrichová
,
Terézia Mézesová
.
cecc 2019
:
[doi]
Security in Process: Detecting Attacks in Industrial Process Data
Simon D. Duque Antón
,
Anna Pia Lohfink
,
Christoph Garth
,
Hans Dieter Schotten
.
cecc 2019
:
[doi]
Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An Essay
Simon D. Duque Antón
,
Anna Pia Lohfink
,
Hans Dieter Schotten
.
cecc 2019
:
[doi]
The Password Literacy in North Macedonia: A Case Study
Andrej Cvetkovski
,
Flavio Esposito
.
cecc 2019
:
[doi]
Determining Minimum Hash Width for Hash Chains
Martin Dietzfelbinger
,
Jörg Keller
.
cecc 2019
:
[doi]
How much does a zero-permission Android app know about us?
Antonios Dimitriadis
,
George Drosatos
,
Pavlos S. Efraimidis
.
cecc 2019
:
[doi]
Digital Forensics vs. Due Process: Conflicting Standards or Complementary Approaches?
Uwe Ewald
.
cecc 2019
:
[doi]
Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion Technique
Ziya Alper Genç
,
Gabriele Lenzini
,
Daniele Sgandurra
.
cecc 2019
:
[doi]
A practical view on IT risk management process
Maksim Goman
.
cecc 2019
:
[doi]
Obfuscated Android Application Development
Pierre Graux
,
Jean-François Lalande
,
Valérie Viet Triem Tong
.
cecc 2019
:
[doi]
Network Forensic Investigation in OpenContrail Environments
Alexander Heckel
,
Daniel Spiekermann
.
cecc 2019
:
[doi]
Approaching the Automation of Cyber Security Testing of Connected Vehicles
Stefan Marksteiner
,
Zhendong Ma
.
cecc 2019
:
[doi]
Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security Testing
Stefan Marksteiner
,
Rudolf Ramler
,
Hannes Sochor
.
cecc 2019
:
[doi]
IPv6 Covert Channels in the Wild
Wojciech Mazurczyk
,
Krystian Powójski
,
Luca Caviglione
.
cecc 2019
:
[doi]
Towards a delegation-type secure software development method
Anze Mihelic
,
Tomaz Hovelja
,
Simon L. R. Vrhovec
.
cecc 2019
:
[doi]
Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security does
Aleksander Murko
,
Simon L. R. Vrhovec
.
cecc 2019
:
[doi]
Accommodating Time-Triggered Authentication to FlexRay Demands
Pal-Stefan Murvay
,
Lucian Popa 0003
,
Bogdan Groza
.
cecc 2019
:
[doi]
Simulating and Detecting Attacks of Untrusted Clients in OPC UA Networks
Charles Varlei Neu
,
Ina Schiering
,
Avelino F. Zorzo
.
cecc 2019
:
[doi]
From Fake News to Virtual Reality: Fake News and Digital Manipulations at the Age of Modern Technology
Tal Pavel
.
cecc 2019
:
[doi]
Cybercrime victimization and seeking help: A survey of students in Slovenia
Kaja Prislan
,
Igor Bernik
,
Gorazd Mesko
,
Rok Hacin
,
Blaz Markelj
,
Simon L. R. Vrhovec
.
cecc 2019
:
[doi]
Meizodon: Security Benchmarking Framework for Static Android Malware Detectors
Sebastiaan Alvarez Rodriguez
,
Erik van der Kouwe
.
cecc 2019
:
[doi]
SAT Solvers and their Limits with NFSR-based Stream Ciphers: an Example with Grain v1
Andreas Schaffhauser
.
cecc 2019
:
[doi]
On the Feasibility of Secure Logging for Industrial Control Systems Using Blockchain
Stefan Schorradt
,
Edita Bajramovic
,
Felix C. Freiling
.
cecc 2019
:
[doi]
Combined side-channels malware detection for NFV infrastructure
Andrew Sergeev
,
Eyal Ben-Sa'adon
,
Elad Tannenbaum
,
Asi Saar
.
cecc 2019
:
[doi]
Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks Datasets
Louis Tajan
,
Dirk Westhoff
.
cecc 2019
:
[doi]
Forensic Investigations in Vehicle Data Stores
Nico Vinzenz
,
Tobias Eggendorfer
.
cecc 2019
:
[doi]
2018
Proceedings of the Central European Cybersecurity Conference 2018, CECC 2018, Ljubljana, Slovenia, November 15-16, 2018
ACM,
2018.
[doi]
Virtual honeypots and detection of telnet botnets
Tomás Bajtos
,
Pavol Sokol
,
Terézia Mézesová
.
cecc 2018
:
[doi]
Application Detection in Anonymous Communication Networks
Mohammad Hajian Berenjestanaki
,
Mohammadali Akhaee
.
cecc 2018
:
[doi]
Hack My Company: An Empirical Assessment of Post-exploitation Behavior and Lateral Movement in Cloud Environments
Daniel Fraunholz
,
Daniel Schneider
,
Janis Zemitis
,
Hans Dieter Schotten
.
cecc 2018
:
[doi]
What drives the motivation to self-protect on social networks?: The role of privacy concerns and perceived threats
Damjan Fujs
,
Simon L. R. Vrhovec
,
Anze Mihelic
.
cecc 2018
:
[doi]
An Ontology Capturing the Interdependence of the General Data Protection Regulation (GDPR) and Information Security
Melisa Geko
,
Simon Tjoa
.
cecc 2018
:
[doi]
Security Analysis of Key Acquiring Strategies Used by Cryptographic Ransomware
Ziya Alper Genç
,
Gabriele Lenzini
,
Peter Y. A. Ryan
.
cecc 2018
:
[doi]
Towards unambiguous IT risk definition
Maksim Goman
.
cecc 2018
:
[doi]
Privacy improvement model for biometric person recognition in ambient intelligence using perceptual hashing
Petra Grd
,
Igor Tomicic
,
Miroslav Baca
.
cecc 2018
:
[doi]
Structural Limitations of B+-Tree forensics
Peter Kieseberg
,
Sebastian Schrittwieser
,
Edgar R. Weippl
.
cecc 2018
:
[doi]
OpenSPA - An Open and Extensible Protocol for Single Packet Authorization
Gregor R. Krmelj
,
Matjaz Pancur
,
Miha Grohar
,
Mojca Ciglaric
.
cecc 2018
:
[doi]
A brief look at the security of DeviceNet communication in industrial control systems
Pal-Stefan Murvay
,
Bogdan Groza
.
cecc 2018
:
[doi]
Coping with Access Control Requirements in the Context of Mutual Dependencies between Business and IT
Roman Pilipchuk
.
cecc 2018
:
[doi]
Aligning Business Process Access Control Policies with Enterprise Architecture
Roman Pilipchuk
,
Stephan Seifermann
,
Robert Heinrich
.
cecc 2018
:
[doi]
A Framework for a Forensically Sound Harvesting the Dark Web
Oliver Popov
,
Jesper Bergman
,
Christian Valassi
.
cecc 2018
:
[doi]
It's all fun and games, and some legalese: data protection implications for increasing cyber-skills of employees through games
Danaja Fabcic Povse
.
cecc 2018
:
[doi]
Improving Lawful Interception in Virtual Datacenters
Daniel Spiekermann
,
Jörg Keller 0001
,
Tobias Eggendorfer
.
cecc 2018
:
[doi]
A Testbed for Performing Security Experiments with Software-Defined Industrial Control Systems
Zoltán Szántó
,
Hunor Sándor
,
Béla Genge
.
cecc 2018
:
[doi]
One Countermeasure, Multiple Patterns: Countermeasure Variation for Covert Channels
Steffen Wendzel
,
Daniela Eller
,
Wojciech Mazurczyk
.
cecc 2018
:
[doi]
Do ut des: Disseminating online child sexual abuse material for investigative purposes?
Sabine K. Witting
.
cecc 2018
:
[doi]
2017
Cycle Structure and Reachability Analysis for Cipher Spritz with Small N
Jörg Keller 0001
.
cecc 2017
:
145-154
[doi]
Advances in Cybersecurity - Proceedings of the 2017 Central European Cybersecurity Conference, CECC 2017, Ljubljana, Slovenia, November 16-17, 2017
Igor Bernik
,
Blaz Markelj
,
S. L. R. Vrhovec
, editors,
University of Maribor Press,
2017.
[doi]
Combat Mobile Evasive Malware via Deep Learning
Irfan Bulut
,
Ali Gökhan Yavuz
,
R. Can Aygun
.
cecc 2017
:
77-88
[doi]
Security of IoT Cloud Services - A User-Oriented Test Approach
Martin Böhm
,
Ina Schiering
,
Diederich Wermser
.
cecc 2017
:
115-130
[doi]
Concept Drift Analysis for Improving Anomaly Detection Systems in Cybersecurity
Michal Choras
,
Michal Wozniak
.
cecc 2017
:
35-42
[doi]
Why Did I End Up Living in a Cave? Risks of IoT at home
Nerea Sainz de la Maza Doñabeitia
,
Miguel Hernández Boza
,
Javier Jiménez del Peso
,
José Ignacio Escribano Pablos
.
cecc 2017
:
131-144
[doi]
Cipher, the Random and the Ransom: A Survey on Current and Future Ransomware
Ziya Alper Genç
,
Gabriele Lenzini
,
Peter Y. A. Ryan
.
cecc 2017
:
89-102
[doi]
Children Privacy Protection in Video Surveillance Based on Automatic Age Estimation
Petra Grd
,
Igor Tomicic
,
Miroslav Baca
.
cecc 2017
:
103-114
[doi]
Mobile Security: Two Generations of Potential Victims
Blaz Markelj
,
Sabina Zgaga
.
cecc 2017
:
65-76
[doi]
Explaining the Employment of Information Security Measures by Individuals in Organizations: The Self-protection Model
Anze Mihelic
,
S. L. R. Vrhovec
.
cecc 2017
:
23-34
[doi]
Information Security Management Practices: Expectations and Reality
Kaja Prislan
,
Branko Lobnikar
,
Igor Bernik
.
cecc 2017
:
5-22
[doi]
Preparation of Response Model to Cyber-attacks at Nuclear Facilities
Samo Tomazic
,
Igor Bernik
.
cecc 2017
:
43-54
[doi]
Use of Mobile Devices in Hospitals and Perceived Data Breach Consequences: An Explorative Study
S. L. R. Vrhovec
,
Blaz Markelj
.
cecc 2017
:
55-64
[doi]
Sign in
or
sign up
to see more results.