Journal: DTRAP

Volume 4, Issue 1

0 -- 0Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis. COVID-19 Vaccination Certificates in the Darkweb
0 -- 0Behnam Shobiri, Mohammad Mannan, Amr M. Youssef. CDNs' Dark Side: Security Problems in CDN-to-Origin Connections
0 -- 0Stefano Carnà, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini 0001. Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters
0 -- 0Henry Howland. CVSS: Ubiquitous and Broken
0 -- 0Alexander Staves, Antonios Gouglidis, David Hutchison 0001. An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments
0 -- 0Alan Levine, Brett Alan Tucker. Zero Trust Architecture: Risk Discussion
0 -- 0Ricardo Alejandro Manzano Sanchez, Kshirasagar Naik, Abdurhman Albasir, Marzia Zaman, Nishith Goel. Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques
0 -- 0Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac. LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses
0 -- 0Saurabh Kumar 0007, Debadatta Mishra, Biswabandan Panda, Sandeep Kumar Shukla. InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems
0 -- 0Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef. APTHunter: Detecting Advanced Persistent Threats in Early Stages
0 -- 0Maksim Ekin Eren, Juston S. Moore, Erik Skau, Elisabeth Moore, Manish Bhattarai, Gopinath Chennupati, Boian S. Alexandrov. General-purpose Unsupervised Cyber Anomaly Detection via Non-negative Tensor Factorization
0 -- 0Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco. The Role of Machine Learning in Cybersecurity
0 -- 0Mengfei Ren 0001, Xiaolei Ren 0001, Huadong Feng, Jiang Ming 0002, Yu Lei 0001. Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing
0 -- 0Max Landauer, Markus Wurzenberger, Florian Skopik, Wolfgang Hotwagner, Georg Höld. AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection
0 -- 0Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng (Daphne) Yao, Cristina Cifuentes. Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases