researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
OR
AND
NOT
1
2021
2022
2023
2024
Filter by Tag
Filter by Author
[+]
OR
AND
NOT
1
Antonis Voulgaridis
Burkhard Stiller
Christos Iliou
Dimitrios Tzovaras
Emanuele Bellini 0001
Francesco Flammini
Gueltoum Bendiab
Ioannis Kompatsiaris
Konstantinos Votis
Luca Faramondi
Nicholas Kolokotronis
Panagiotis G. Sarigiannidis
Panagiotis I. Radoglou-Grammatikis
Roberto Setola
Salvatore D'Antonio
Sotiris Ioannidis
Stavros Shiaeles
Stefanos Vrochidis
Theodora Tsikrika
Thomas Lagkas
Filter by Top terms
[+]
OR
AND
NOT
1
analysis
approach
attack
attacks
cyber
cybersecurity
data
detection
intrusion
iot
learning
machine
network
networks
resilience
security
system
systems
threat
using
CSR (csr2)
Editions
Publications
Viewing Publication 1 - 100 from 397
2024
Transitioning SSH European Research Infrastructures to Critical Infrastructure Through Resilience
Emanuele Bellini 0001
,
Emiliano Degl'Innocenti
.
csr2 2024
:
801-806
[doi]
IEEE International Conference on Cyber Security and Resilience, CSR 2024, London, UK, September 2-4, 2024
IEEE,
2024.
[doi]
Toward a Unified Security Framework for Digital Twin Architectures
Sani M. Abdullahi
,
Sanja Lazarova-Molnar
.
csr2 2024
:
612-617
[doi]
The Need for Cyber-Resilience in Complex Systems
Sezen Acur
,
Teun Hendriks
.
csr2 2024
:
480-485
[doi]
Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous Vehicles
Fatimah Aloraini
,
Amir Javed
.
csr2 2024
:
714-719
[doi]
Towards Developing an Asset-Criticality Identification Framework in Smart Grids
Yazeed Alrowaili
,
Neetesh Saxena
,
Pete Burnap
.
csr2 2024
:
720-725
[doi]
Navigating (in)Security of AI-Generated Code
Sri Haritha Ambati
,
Norah Ridley
,
Enrico Branca
,
Natalia Stakhanova
.
csr2 2024
:
1-8
[doi]
Enhancing Cyber-Physical Security: Integrating Virtual Fences Within Digital Twins
Alì Aghazadeh Ardebili
,
Antonella Longo
,
Antonio Ficarella
.
csr2 2024
:
630-637
[doi]
Ineffectiveness of Digital Transformations for Detecting Adversarial Attacks Against Quantized and Approximate CNNs
Salvatore Barone
,
Valentina Casola
,
Salvatore Della Torca
.
csr2 2024
:
290-295
[doi]
PENTEST-AI, an LLM-Powered Multi-Agents Framework for Penetration Testing Automation Leveraging Mitre Attack
Stanislas G. Bianou
,
Rodrigue G. Batogna
.
csr2 2024
:
763-770
[doi]
A Version-Based Algorithm for Quality Enhancement of Automatically Generated Vulnerability Inventories
Silvia Bonomi
,
Marco Cuoci
,
Simone Lenti
.
csr2 2024
:
76-81
[doi]
Towards a Reputational-Based Trustworthy Archaeological Information System
Margherita Bottoni
,
Emanuele Bellini 0001
,
Emeri Farinetti
.
csr2 2024
:
795-800
[doi]
When Rewards Deceive: Counteracting Reward Poisoning on Online Deep Reinforcement Learning
Myria Bouhaddi
,
Kamel Adi
.
csr2 2024
:
38-44
[doi]
A Looping Process for Cyberattack Mitigation
Daniele Bringhenti
,
Francesco Pizzato
,
Riccardo Sisto
,
Fulvio Valenza
.
csr2 2024
:
276-281
[doi]
On-line Anomaly Detection and Qualification of Random Bit Streams
Cesare Caratozzolo
,
Valeria Rossi
,
Kamil Witek
,
Alberto Trombetta
,
Massimo Caccia
.
csr2 2024
:
897-904
[doi]
Onto Hunt - A Semantic Reasoning Approach to Cyber Threat Hunting with Indicators of Behaviour
Robert Andrew Chetwyn
,
Martin Eian
,
Audun Jøsang
.
csr2 2024
:
853-859
[doi]
A Deep Learning Framework for Safety Monitoring of a Railway Section
F. Z. Chriki
,
E. Simó
,
Francesc Aguiló
,
I. Garcia-Milà
,
X. Masip
.
csr2 2024
:
1-6
[doi]
Strengthening Cybersecurity Certifications Through Robust Chain of Custody Practices
Jasmin Cosic
,
Admir Jukan
,
Miroslav Baca
.
csr2 2024
:
570-574
[doi]
Cyber Resilience in OT: Characteristics and Security Challenges
Marius Cotiga
,
Jens Myrup Pedersen
,
Edlira Dushku
.
csr2 2024
:
750-756
[doi]
A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning Attacks
Giovanni Maria Cristiano
,
Salvatore D'Antonio
,
Federica Uccello
.
csr2 2024
:
664-669
[doi]
Can a Llama Be a Watchdog? Exploring Llama 3 and Code Llama for Static Application Security Testing
Claudio Curto
,
Daniela Giordano
,
Daniel Gustav Indelicato
,
Vladimiro Patatu
.
csr2 2024
:
395-400
[doi]
Enhancing Healthcare Data Confidentiality through Decentralized TEE Attestation
Salvatore D'Antonio
,
Jonah Giglio
,
Giovanni Mazzeo
,
Federica Uccello
,
Teresa Mannarino
.
csr2 2024
:
676-681
[doi]
Situational Awareness Scoring System in Cyber Range Platforms
Amalia Damianou
,
Mariana S. Mazi
,
Georgios Rizos
,
Antonis Voulgaridis
,
Konstantinos Votis
.
csr2 2024
:
520-525
[doi]
DIONYSUS - Deception Networks for the Cybersecurity of Physical Protection Systems
Cyprien de la Vergne de Cerval
,
Eric Perret
,
Jonathan Sarrazin
,
Olivier Fichot
,
Vincent E. Urias
,
William M. S. Stout
,
Shadya B. Maldonado Rosado
.
csr2 2024
:
1-6
[doi]
Active Learning-Based Mobile Malware Detection Utilizing Auto-Labeling and Data Drift Detection
Zhe Deng
,
Arthur Hubert
,
Sadok Ben Yahia
,
Hayretdin Bahsi
.
csr2 2024
:
146-151
[doi]
Forensic Analysis of Android Notifications' History
Evangelos Dragonas
,
Costas Lambrinoudakis
.
csr2 2024
:
1-6
[doi]
Uncovering Hidden Threats: Automated, Machine Learning-based Discovery & Extraction of Cyber Threat Intelligence from Online Sources
Rafail A. Ellinitakis
,
Konstantinos Fysarakis
,
Panagiotis Bountakas
,
George Spanoudakis
.
csr2 2024
:
1-6
[doi]
A Trust Management Delegation Protocol for Fog Computing Applications
Phongsathon Fongta
,
Sotirios Terzis
.
csr2 2024
:
1-6
[doi]
A Hybrid Anomaly Detection Approach for Obfuscated Malware
Gerard Shu Fuhnwi
,
Matthew Revelle
,
Clemente Izurieta
.
csr2 2024
:
159-165
[doi]
Are IDS Violating Segmentation in Industrial Networks?
Giovanni Battista Gaggero
,
Roberto Caviglia
,
Paola Girdinio
,
Mario Marchese
.
csr2 2024
:
45-49
[doi]
Zero to Trust? Bringing Application-Level Intelligence at Scale to Detection Engineering
Fatih Gey
,
Cédric Hébert
,
Holger Mack
.
csr2 2024
:
452-457
[doi]
Peer-to-Peer Meets Onion: The Veilid Framework
Sven Glatzer
,
Stavros Shiaeles
,
Rinat Khusainov
,
Rahim Taheri
.
csr2 2024
:
1-6
[doi]
A Forensic Framework for Screen Capture Validation in Legal Contexts
Claudia Greco
,
Michele Ianni
,
Giuseppe Seminara
,
Antonella Guzzo
,
Giancarlo Fortino
.
csr2 2024
:
127-132
[doi]
Autonomous Cyberattack with Security-Augmented Generative Artificial Intelligence
Jonathan Gregory
,
Qi Liao
.
csr2 2024
:
270-275
[doi]
2HD: Adaptive Adversarial Training for Hyperdimensional Computing-Based Intrusion Detection Against Adversarial Attacks
Onat Güngör
,
Tajana Rosing
,
Baris Aksanli
.
csr2 2024
:
107-113
[doi]
A Systematic Review of Cybersecurity Audit Frameworks for the Internet of Things
Danielle Hanson
,
Jeremy Straub
.
csr2 2024
:
133-138
[doi]
Multi-Blockchain Model for IoT Devices Forensic Investigations on Spidernet
Soraya Harding
,
Mo Adda
.
csr2 2024
:
120-126
[doi]
Automatic Discovery of Cyberattacks
Guillaume Hutzler
,
Hanna Klaudel
,
Witold Klaudel
,
Franck Pommereau
,
Artur Rataj
.
csr2 2024
:
1-8
[doi]
The Impact of GPS Interference in the Middle East
Vasilis Ieropoulos
.
csr2 2024
:
732-736
[doi]
Designing Trustworthy Decentralized Cross-Chain Marketplaces: A 6G Network of Networks Perspective
Lalita Jagadeesan
,
Shushu Liu
,
Lizette Velázquez
.
csr2 2024
:
562-569
[doi]
Taxonomy of Cyber Risk Mitigation Cost Benefit Analysis Methods for Energy Infrastructure
Yvonne Hwei-Syn Kam
,
Kevin D. Jones
,
Kimberly Tam
,
Robert Rawlinson-Smith
.
csr2 2024
:
771-776
[doi]
Secure AI/ML-Based Control in Intent-Based Management System
Leyli Karaçay
,
Ahmet Cihat Baktir
,
Ramin Fuladi
,
Elham Dehghan Biyar
,
Ömer Faruk Tuna
,
Ipek Arikan
.
csr2 2024
:
618-623
[doi]
Detecting Covert Channels in Cloud Access Control Policies Using Large Language Models
Hrishikesh Karmarkar
,
Vaibhavi Joshi
,
R. Venkatesh 0001
.
csr2 2024
:
241-246
[doi]
DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity Proof
Dimitrios Kasimatis
,
Sam Grierson
,
William J. Buchanan
,
Chris Eckl
,
Pavlos Papadopoulos
,
Nikolaos Pitropakis
,
Christos Chrysoulas
,
Craig Thomson
,
Baraq Ghaleb
.
csr2 2024
:
866-871
[doi]
Strengthening the Digital Ecosystem: Effects of the Cyber Resilience Act (CRA) on Open-Source Software
Matija Kikelj
,
Ivan Sabic
.
csr2 2024
:
557-561
[doi]
Building a Use Case-Driven Adversarial Threat Matrix: A Comprehensive Approach
Prodromos Kiriakidis
,
Efi Kafali
,
Georgios Rizos
,
Antonis Voulgaridis
,
Theodoros Semertzidis
,
Stephane Gazut
,
Petros Daras
,
Konstantinos Votis
.
csr2 2024
:
587-592
[doi]
Minimizing Area Footprint of UAV Communication Security Using FPGAs
Evangelia Konstantopoulou
,
George S. Athanasiou
,
Nicolas Sklavos 0001
.
csr2 2024
:
919-924
[doi]
An End-to-End Framework for Cybersecurity Taxonomy and Ontology Generation and Updating
Anna Kougioumtzidou
,
Angelos Papoutsis
,
Dimitrios Kavallieros
,
Thanassis Mavropoulos
,
Theodora Tsikrika
,
Stefanos Vrochidis
,
Ioannis Kompatsiaris
.
csr2 2024
:
247-254
[doi]
SDN-Based Reconfiguration of Distributed and Cooperative Microgrid Control Systems for Mitigating Synchronization Attacks
Aurélie Kpoze
,
Abdelkader Lahmadi
,
Isabelle Chrisment
,
Jules Degila
.
csr2 2024
:
789-794
[doi]
Unraveling the Threat Landscape of CPS: Modbus TCP Vulnerabilities in the Era of I4.0
George Lazaridis
,
Anastasios Drosou
,
Periklis Chatzimisios
,
Dimitrios Tzovaras
.
csr2 2024
:
593-598
[doi]
SEAGuard: A Blockchain-Based Security Framework for IoT Maritime Transportation Systems
Panagiotis Leonis
,
Konstantinos Ntouros
,
Antonio I. Mazilu
,
Sotirios Brotsis
,
Nicholas Kolokotronis
.
csr2 2024
:
421-426
[doi]
Use of Visibility Graphs for the Early Detection of DoS Attacks
João Lopes
,
Pedro Pinto 0001
,
Alberto Partida
,
António Pinto
.
csr2 2024
:
101-106
[doi]
Identifying Android Banking Malware Through Measurement of User Interface Complexity
Sean McElroy
.
csr2 2024
:
348-353
[doi]
Developing a Robust Communication Infrastructure for a Distributed Smart Grid IDS
Verena Menzel
,
Jan Speckamp
,
Anne Remke
.
csr2 2024
:
1-8
[doi]
A Privacy-Preserving and Secure Scheme for Online Payment in the Realm of Mobile Commerce
Mohammad Rasool Momeni
,
Abdollah Jabbari
,
Carol J. Fung
.
csr2 2024
:
367-372
[doi]
Detecting Cryptographic Functions for String Obfuscation
Pierre Mondon
,
Rogério de Lemos
.
csr2 2024
:
315-320
[doi]
Using a Sensor-Health-Aware Resilient Fusion for Localization in the Presence of GPS Spoofing Attacks
Samin Moosavi
,
Isabel Moore
,
Swaminathan Gopalswamy
.
csr2 2024
:
498-505
[doi]
Static Detection of Missing Validations in Solidity Smart Contracts
Sundas Munir
,
Walid Taha
,
Mirza Sanam Iqbal Baig
.
csr2 2024
:
413-420
[doi]
Vehicular Network Security Against RF Jamming: An LSTM Detection System
Mubashir Murshed
,
Afrin Jubaida
,
Robson E. De Grande
,
Glaucio H. S. Carvalho
.
csr2 2024
:
599-604
[doi]
Secure and Transparent Data Sharing Among Connected Devices: Integrating Data Spaces and Provenance
Roberto Nardone
,
Alfredo Petruolo
,
Federica Uccello
.
csr2 2024
:
670-675
[doi]
A Survey of Digital Forensic Tools for Android and iOS Smart Phones
Sthembile Ntshangase
,
Norman Nelufule
,
David Mulihase
,
Mamello Mtshali
,
Chantel Mokoena
,
Palesa Moloi
.
csr2 2024
:
139-145
[doi]
Structural Generalization in Autonomous Cyber Incident Response with Message-Passing Neural Networks and Reinforcement Learning
Jakob Nyberg
,
Pontus Johnson
.
csr2 2024
:
282-289
[doi]
Software Security Testing Lifecycle for Automotive Products
Anupriya Pandey
,
Kamal Singh
.
csr2 2024
:
432-436
[doi]
Towards GPU Accelerated FHE Computations
Orion Papadakis
,
Michail Papadimitriou
,
Athanasios Stratikopoulos
,
Maria Xekalaki
,
Juan Fumero
,
Nikos Foutris
,
Christos Kotselidis
.
csr2 2024
:
694-699
[doi]
FPGA-Based Cloud Security Solutions for 5G Networks
Marios Papadopoulos
,
Kostas Lampropoulos
,
Paris Kitsos
.
csr2 2024
:
913-918
[doi]
Composite Inspection and Certification (CIC) System for Cybersecuity Assessment of ICT Products, Services, and Processes
Spyridon Papastergiou
,
Shareeful Islam
,
Eleni-Maria Kalogeraki
,
Argyro Chatzopoulou
,
Panagiotis Bountakas
,
Konstantinos Pournaras
,
Sreedevi Beena
,
Nineta Polemi
.
csr2 2024
:
833-838
[doi]
DefenceRank - Ranking Based Attack Graph Analysis and Defence Prioritization
Rajendra Shivaji Patil
,
Markus Dypbukt Källman
,
Viktoria Fodor
.
csr2 2024
:
466-473
[doi]
ROT: Retention and Operation Limitation Using TEE
Sumit Kumar Paul
,
D. A. Knox
.
csr2 2024
:
228-234
[doi]
A Time-Series and Density-Based Filter for DNS Log Reduction and Analysis
Taylor Perkins
,
Brian Lachine
.
csr2 2024
:
303-308
[doi]
ZADIG: A novel Extended Detection and Response System
Stefano Perone
,
Luca Faramondi
,
Simone Guarino
,
Martina Nobili
,
Roberto Setola
,
Ernesto Del Prete
,
Giovanni Patruno
,
Luca Piccirillo
,
Annunziata Laurenda
.
csr2 2024
:
688-693
[doi]
Third-party Cloud Risk Management
Breno Silva Pinto
,
Lucas Cioffi
,
Felipe Espósito
.
csr2 2024
:
445-451
[doi]
Investigating Cyber Risks in a Surgical Process for Healthcare Cyber Resilience
Mahdad Pourmadadkar
,
Marianna Lezzi
,
Ali Aghazedeh Ardebili
.
csr2 2024
:
575-580
[doi]
Evaluating Few-Shot Learning Generative Honeypots in A Live Deployment
Jarrod Ragsdale
,
Rajendra V. Boppana
.
csr2 2024
:
379-386
[doi]
Understanding & Mitigating the Challenges of Securing Jupyter Notebooks Online
Adrian Ramsingh
,
Pradeep Verma
.
csr2 2024
:
1-7
[doi]
SoK: Autonomic Computing Based Mehods for ICS/SCADA and IIoT Security
Christopher Rouff
,
Ali Tekeoglu
.
csr2 2024
:
807-812
[doi]
Autonomic Passive IT-OT Device Classification in ICS/SCADA Networks
Benny Rubin
,
Ali Tekeoglu
,
Christopher Rouff
.
csr2 2024
:
813-818
[doi]
Cybersecurity as a Backbone for Sustainability
Gohar Sargsyan
.
csr2 2024
:
526-530
[doi]
Deep Graph Learning for DDoS Detection and Multi-Class Classification IDS
Braden J. Saunders
,
Robson E. De Grande
,
Glaucio H. S. Carvalho
,
Isaac Woungang
.
csr2 2024
:
96-100
[doi]
Anomaly Detection in Operational Technology Systems Using Non-Intrusive Load Monitoring Based on Supervised Learning
A. Schroeder
,
Patrick McClure
,
P. Thulasiraman
.
csr2 2024
:
1-6
[doi]
From Data to Defense: Real-Time Detection of Botnets in IoT Using LSTM Networks
shadi sadeghpour
,
Farhath Zareen
,
William A. Johnson
.
csr2 2024
:
605-611
[doi]
Advancing Security in 5G Core Networks Through Unsupervised Federated Time Series Modeling
Saeid Sheikhi
,
Panos Kostakos 0001
.
csr2 2024
:
353-356
[doi]
Message from the Chairs
Stavros Shiaeles
,
Nicholas Kolokotronis
,
Emanuele Bellini 0001
.
csr2 2024
:
[doi]
Ransomware Detection: Ensemble Machine Learning Models Using Disjoint Data
Charles M. R. Da Silva
,
Paulo André L. De Castro
,
Cecilia De A. C. Cesar
.
csr2 2024
:
1-6
[doi]
Empirical Analysis and Practical Assessment of Ransomware Attacks to Data in Motion
Raúl Reinosa Simón
,
Clara I. Valero
,
José A. Martínez Cadenas
,
Elisa R. Heymann
,
Ignacio Lacalle
,
Barton P. Miller
,
Carlos Enrique Palau
.
csr2 2024
:
216-221
[doi]
An SDR-Based Framework for Cybersecurity Assessment of Vehicle-to-Everything (V2X) Systems
Muhammad Saad Sohail
,
Giancarlo Portamauro
,
Fabio Patrone
,
Mario Marchese
.
csr2 2024
:
1-8
[doi]
A Security Analysis of a Deterministic Key Generation Scheme
Dennis Song
,
YuPing Yan
,
George Shao
,
Feida Zhu
,
Mason Song
.
csr2 2024
:
309-314
[doi]
SecureExecutor: An Automated Way to Leverage SCONE to Enhance Application Security
Christos Spyridakis
,
Angeliki Aktypi
,
Thomas Kyriakakis
,
Sotiris Ioannidis
.
csr2 2024
:
827-832
[doi]
Active Honey Files for Ransomware Encryption Mitigation
Ioannis Stamelos
,
George Hatzivasilis
,
Sotiris Ioannidis
.
csr2 2024
:
706-713
[doi]
Application of Robotic Exploration Principles to the Challenge of Cybersecurity Penetration Testing
Jeremy Straub
.
csr2 2024
:
255-261
[doi]
Identifying Novelty in Network Traffic
Joshua Sylvester
,
Rogério de Lemos
.
csr2 2024
:
506-511
[doi]
Towards Live Detection of Ransomware Attacks
Kumar Thummapudi
,
Rajendra V. Boppana
,
Palden Lama
.
csr2 2024
:
458-465
[doi]
The Affordability of Cybersecurity Costs in Developing Countries: A Systematic Review
Chinazunwa Uwaoma
,
Ayush Enkhtaivan
.
csr2 2024
:
545-550
[doi]
Attack-Specific Feature Construction to Detect Malicious TCP Flows
Vasudha Vedula
,
Rajendra V. Boppana
,
Palden Lama
.
csr2 2024
:
208-215
[doi]
Lightweight Testbed for IEC61162-450-Related Cyber Security Research
Gabor Visky
,
Sokratis Katsikas
,
Olaf Maennel
.
csr2 2024
:
638-643
[doi]
On Impact of Video Motion on Image Encryption/Decryption. Comparative Results
Anastasiia Voitenko
,
Mourad Oussalah 0002
.
csr2 2024
:
407-412
[doi]
The Danger Within: Insider Threat Modeling Using Business Process Models
Jan von der Assen
,
Jasmin Hochuli
,
Thomas Grübl
,
Burkhard Stiller
.
csr2 2024
:
186-192
[doi]
Safety Analysis for Cyber-Physical Systems Under Cyber Attacks Using Digital Twin
Ruizhe Wang
,
Sarad Venugopalan
,
Sridhar Adepu
.
csr2 2024
:
1-8
[doi]
Framework for Quantitative Evaluation of Resilience Solutions: An Approach to Determine the Value of Resilience for a Particular Site
Mark R. Weimar
.
csr2 2024
:
757-762
[doi]
Forensic Communication Analysis: Challenges and Opportunities
Jian Xi
,
Lukas Jaeckel
,
Michael Spranger
,
Melanie Siegel
,
Dirk Labudde
.
csr2 2024
:
878-883
[doi]
AI-Based Attacker Models for Enhancing Multi-Stage Cyberattack Simulations in Smart Grids Using Co-Simulation Environments
Ömer Sen
,
Christoph Pohl
,
Immanuel Hacker
,
Markus Stroot
,
Andreas Ulbig
.
csr2 2024
:
68-75
[doi]
Sign in
or
sign up
to see more results.