| 0 | -- | 0 | Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis. COVID-19 Vaccination Certificates in the Darkweb |
| 0 | -- | 0 | Behnam Shobiri, Mohammad Mannan, Amr M. Youssef. CDNs' Dark Side: Security Problems in CDN-to-Origin Connections |
| 0 | -- | 0 | Stefano Carnà, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini 0001. Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters |
| 0 | -- | 0 | Henry Howland. CVSS: Ubiquitous and Broken |
| 0 | -- | 0 | Alexander Staves, Antonios Gouglidis, David Hutchison 0001. An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments |
| 0 | -- | 0 | Alan Levine, Brett Alan Tucker. Zero Trust Architecture: Risk Discussion |
| 0 | -- | 0 | Ricardo Alejandro Manzano Sanchez, Kshirasagar Naik, Abdurhman Albasir, Marzia Zaman, Nishith Goel. Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques |
| 0 | -- | 0 | Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac. LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses |
| 0 | -- | 0 | Saurabh Kumar 0007, Debadatta Mishra, Biswabandan Panda, Sandeep Kumar Shukla. InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems |
| 0 | -- | 0 | Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef. APTHunter: Detecting Advanced Persistent Threats in Early Stages |
| 0 | -- | 0 | Maksim Ekin Eren, Juston S. Moore, Erik Skau, Elisabeth Moore, Manish Bhattarai, Gopinath Chennupati, Boian S. Alexandrov. General-purpose Unsupervised Cyber Anomaly Detection via Non-negative Tensor Factorization |
| 0 | -- | 0 | Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco. The Role of Machine Learning in Cybersecurity |
| 0 | -- | 0 | Mengfei Ren 0001, Xiaolei Ren 0001, Huadong Feng, Jiang Ming 0002, Yu Lei 0001. Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing |
| 0 | -- | 0 | Max Landauer, Markus Wurzenberger, Florian Skopik, Wolfgang Hotwagner, Georg Höld. AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection |
| 0 | -- | 0 | Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng (Daphne) Yao, Cristina Cifuentes. Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases |