Journal: DTRAP

Volume 3, Issue 4

0 -- 0Adam Zibak, Clemens Sauerwein, Andrew C. Simpson. Threat Intelligence Quality Dimensions for Research and Practice
0 -- 0Louise Axon, Katherine Fletcher, Arianna Schuler Scott, Marcel Stolz, Robert Hannigan, Ali El Kaafarani, Michael Goldsmith, Sadie Creese. Emerging Cybersecurity Capability Gaps in the Industrial Internet of Things: Overview and Research Agenda
0 -- 0Karl Mozurkewich. Field Note on IoT Security: Novel JIT Security for Large-Scale Heterogeneous IoT Deployments
0 -- 0Allen D. Householder, Jonathan M. Spring. Are We Skillful or Just Lucky? Interpreting the Possible Histories of Vulnerability Disclosures
0 -- 0Éireann Leverett, Matilda Rhode, Adam Wedgbury. Vulnerability Forecasting: Theory and Practice
0 -- 0Jinxin Liu 0001, Murat Simsek, Burak Kantarci, Melike Erol-Kantarci, Andrew J. Malton, Andrew Walenstein. Risk-aware Fine-grained Access Control in Cyber-physical Contexts
0 -- 0Pooria Madani, Natalija Vlajic, Ivo Maljevic. Randomized Moving Target Approach for MAC-Layer Spoofing Detection and Prevention in IoT Systems
0 -- 0Johannes Düsing, Ben Hermann. Analyzing the Direct and Transitive Impact of Vulnerabilities onto Different Artifact Repositories
0 -- 0Paul Shomo, Sebastián Echeverría, Jesse Sowell. Introduction to the Special Issue on the Lifecycle of IoT (In)security
0 -- 0Ming Li, Peter J. Hawrylak, John Hale. Strategies for Practical Hybrid Attack Graph Generation and Analysis
0 -- 0Paul-David Jarvis, Amalia Damianou, Cosmin Ciobanu, Vasilis Katos. Vulnerability Exposure Driven Intelligence in Smart, Circular Cities
0 -- 0Fabio Massacci, Nick Nikiforakis, Ivan Pashchenko, Antonino Sabetta, Victoria Wang. Introduction to the Special Issue on Vulnerabilities

Volume 3, Issue 3

0 -- 0Alexandre Dulaunoy, Jean-Louis Huynen, Aurelien Thirion. Active and Passive Collection of SSH Key Material for Cyber Threat Intelligence
0 -- 0Martin Husák, Martin Lastovicka, Tomás Plesník. Handling Internet Activism During the Russian Invasion of Ukraine: A Campus Network Perspective
0 -- 0Borce Stojkovski, Ruba Abu-Salma, Karen Triquet, Gabriele Lenzini. "Unless One Does the Research, It May Seem as Just a Useless Battery-consuming App" - Field Notes on COVID-19 Contact Tracing Applications
0 -- 0Shehzeen Hussain, Paarth Neekhara, Brian Dolhansky, Joanna Bitton, Cristian Canton-Ferrer, Julian J. McAuley, Farinaz Koushanfar. Exposing Vulnerabilities of Deepfake Detection Systems with Robust Attacks
0 -- 0Giovanni Apruzzese, Mauro Andreolini, Luca Ferretti, Mirco Marchetti, Michele Colajanni. Modeling Realistic Adversarial Attacks against Network Intrusion Detection Systems
0 -- 0Christopher Jelesnianski, Jinwoo Yom, Changwoo Min, Yeongjin Jang. Securely Sharing Randomized Code That Flies
0 -- 0Mila Bajic, Andrej Petrovski, Bojan Perkov. Field Note on Doing Digital Rights: Central and Southeast Europe Monitoring Project
0 -- 0Gabriel Kaptchuk, Daniel G. Goldstein, Eszter Hargittai, Jake M. Hofman, Elissa M. Redmiles. How Good is Good Enough? Quantifying the Impact of Benefits, Accuracy, and Privacy on Willingness to Adopt COVID-19 Decision Aids
0 -- 0Lucimara Desiderá, Jeroen van der Ham. Introduction to the Special Issue on the 2020 FIRST Conference
0 -- 0Lucy Simko, Jack Lucas Chang, Maggie Jiang, Ryan Calo, Franziska Roesner, Tadayoshi Kohno. COVID-19 Contact Tracing and Privacy: A Longitudinal Study of Public Opinion
0 -- 0Gabriel Kaptchuk, Fabio Massacci, Sara Nieves Matheu-García, Elissa M. Redmiles. Introduction to the Special Issue on Security and Privacy for COVID-19
0 -- 0Desiree Sacher-Boldewin, Éireann Leverett. The Intelligent Process Lifecycle of Active Cyber Defenders
0 -- 0Chung-Kuan Chen, Si-Chen Lin, Szu-Chun Huang, Yung-Tien Chu, Chin-Laung Lei, Chun-Ying Huang. Building Machine Learning-based Threat Hunting System from Scratch
0 -- 0Antoine Boutet, Claude Castelluccia, Mathieu Cunche, Cédric Lauradoux, Vincent Roca, Adrien Baud, Pierre-Guillaume Raverdy. Desire: Leveraging the Best of Centralized and Decentralized Contact Tracing Systems
0 -- 0Serge Vaudenay, Martin Vuagnoux. SwissCovid in the Perspective of Its Goals
0 -- 0Chase Cotton. "Off-Label" Use of DNS

Volume 3, Issue 2

0 -- 0Martin Rosso, Michele Campobasso, Ganduulga Gankhuyag, Luca Allodi. SAIBERSOC: A Methodology and Tool for Experimenting with Security Operation Centers
0 -- 0Fritz Alder, Jo Van Bulck, Jesse Spielman, David F. Oswald, Frank Piessens. Faulty Point Unit: ABI Poisoning Attacks on Trusted Execution Environments
0 -- 0J. S. Panman de Wit, Doina Bucur, J. van der Ham. Dynamic Detection of Mobile Malware Using Smartphone Data and Machine Learning
0 -- 0Daniele Cono D'Elia, Lorenzo Invidia, Federico Palmaro, Leonardo Querzoni. Evaluating Dynamic Binary Instrumentation Systems for Conspicuous Features and Artifacts
0 -- 0Roberto Perdisci, Martina Lindorfer, Gianluca Stringhini. Introduction to the ACSAC'20 Special Issue
0 -- 0Ricardo J. Rodríguez, Xabier Ugarte-Pedrero, Juan Tapiador. Introduction to the Special Issue on Challenges and Trends in Malware Analysis
0 -- 0Ailton Santos Filho, Ricardo J. Rodríguez, Eduardo L. Feitosa. Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation Frameworks
0 -- 0Sean Oesch, Ruba Abu-Salma, Oumar Diallo, Juliane Krämer, James Simmons, Justin Wu, Scott Ruoti. User Perceptions of Security and Privacy for Group Chat
0 -- 0Sheng Sun. A Chosen Random Value Attack on WPA3 SAE Authentication Protocol

Volume 3, Issue 1

0 -- 0Paul J. Sticha, Tirso E. Diaz, Elise T. Axelrad, Sean D. Vermillion, Dennis M. Buede. Simulating Organizational Data from Redacted Input for Inference Enterprise Modeling
0 -- 0Adam D. Williams, Shannon N. Abbott, Nathan Shoman, William S. Charlton. Results From Invoking Artificial Neural Networks to Measure Insider Threat Detection & Mitigation
0 -- 0. Introduction to the Special Issue on Insider Threats
0 -- 0Siri Bromander, Morton Swimmer, Lilly Pijnenburg Muller, Audun Jøsang, Martin Eian, Geir Skjøtskift, Fredrik Borg. Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange
0 -- 0Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi. Privacy-aware Character Pattern Matching over Outsourced Encrypted Data
0 -- 0Panpan Zheng, Shuhan Yuan, Xintao Wu. Using Dirichlet Marked Hawkes Processes for Insider Threat Detection
0 -- 0Ephraim Zimmer, Christian Burkert, Hannes Federrath. Insiders Dissected: New Foundations and a Systematisation of the Research on Insiders