Journal: DTRAP

Volume 4, Issue 4

0 -- 0Antonios Xenakis, Sabrina Mamtaz Nourin, Zhiyuan Chen 0003, George Karabatis, Ahmed AlEroud, Jhancy Amarsingh. A Self-adaptive and Secure Approach to Share Network Trace Data
0 -- 0Michael Lang 0001, Lena Yuryna Connolly, Paul Taylor, Phillip J. Corner. The Evolving Menace of Ransomware: A Comparative Analysis of Pre-pandemic and Mid-pandemic Attacks
0 -- 0David Allison, Kieran McLaughlin, Paul Smith 0001. Goosewolf: An Embedded Intrusion Detection System for Advanced Programmable Logic Controllers
0 -- 0Angel Hueca, Sharon Mudd, Timothy J. Shimeall. Introduction to the Special Issue on Information Sharing
0 -- 0Anna Cartwright 0001, Edward J. Cartwright. The Economics of Ransomware Attacks on Integrated Supply Chain Networks
0 -- 0Pranshu Bajpai, Richard J. Enbody. Know Thy Ransomware Response: A Detailed Framework for Devising Effective Ransomware Response Strategies
0 -- 0Koen van Hove, Jeroen van der Ham-de Vos, Roland van Rijswijk-Deij. rpkiller: Threat Analysis of the BGP Resource Public Key Infrastructure
0 -- 0Budi Arief, Lena Yuryna Connolly, Julio C. Hernandez-Castro, Allan Liska, Peter Y. A. Ryan. Introduction to the Special Issue on Ransomware
0 -- 0Kate Connolly, Anna Klempay, Mary McCann, Paul R. Brenner. Dark Web Marketplaces: Data for Collaborative Threat Intelligence
0 -- 0Michael Mundt, Harald Baier. Threat-Based Simulation of Data Exfiltration Toward Mitigating Multiple Ransomware Extortions
0 -- 0Yagiz Yilmaz, Orçun Çetin, Claudia Grigore, Budi Arief, Julio C. Hernandez-Castro. Personality Types and Ransomware Victimisation
0 -- 0Martin Husák, Pavol Sokol, Martin Zádník, Václav Bartos, Martin Horák. Lessons Learned from Automated Sharing of Intrusion Detection Alerts: The Case of the SABU Platform
0 -- 0Louise Axon, Arnau Erola, Ioannis Agrafiotis, Ganbayar Uuganbayar, Michael Goldsmith, Sadie Creese. Ransomware as a Predator: Modelling the Systemic Risk to Prey

Volume 4, Issue 3

0 -- 0Thomas Göbel, Harald Baier, Frank Breitinger. Data for Digital Forensics: Why a Discussion on "How Realistic is Synthetic Data" is Dispensable
0 -- 0Anthony Rose, Scott R. Graham, Jacob J. Krasnov. IronNetInjector: Weaponizing .NET Dynamic Language Runtime Engines
0 -- 0Oleg Boyarchuk, Sebastiano Mariani, Stefano Ortolani, Giovanni Vigna. Keeping Up with the Emotets: Tracking a Multi-infrastructure Botnet
0 -- 0Samantha Klier, Jan Varenkamp, Harald Baier. Back and Forth - On Automatic Exposure of Origin and Dissemination of Files on Windows
0 -- 0Shreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis. Gotta Catch 'em All: A Multistage Framework for Honeypot Fingerprinting
0 -- 0Edita Bajramovic, Christofer Fein, Marius Frinken, Paul Rösler, Felix C. Freiling. LAVA: Log Authentication and Verification Algorithm
0 -- 0Kibreab Adane, Berhanu Beyene, Mohammed Abebe Yimer. Single and Hybrid-Ensemble Learning-Based Phishing Website Detection: Examining Impacts of Varied Nature Datasets and Informative Feature Selection Technique
0 -- 0Florian Bausch, Andreas Dewald. Forensic Examination of Ceph
0 -- 0Sharifah Roziah Binti Mohd Kassim, Shujun Li, Budi Arief. Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions
0 -- 0P. Mohan Anand, P. V. Sai Charan, Sandeep K. Shukla. HiPeR - Early Detection of a Ransomware Attack using Hardware Performance Counters
0 -- 0Andreas Dewald, Thomas Schreck. Introduction to the IMF 2023 Special Issue
0 -- 0Jan Gruber, Merlin Humml. A Formal Treatment of Expressiveness and Relevanceof Digital Evidence
0 -- 0Mattia Falduti, Sergio Tessaris. Mapping the Interdisciplinary Research on Non-consensual Pornography: Technical and Quantitative Perspectives
0 -- 0Marcus Botacin, Uriel Kosayev, Ruimin Sun. Introduction to the Special Issue on Memory-Based Malware and Other Unconventional Threats
0 -- 0Andreas Hammer 0003, Mathis Ohlig, Julian Geus, Felix C. Freiling. A Functional Classification of Forensic Access to Storage and its Legal Implications
0 -- 0Tobias Hilbig, Thomas Geras, Erwin Kupris, Thomas Schreck. security.txt Revisited: Analysis of Prevalence and Conformity in 2022

Volume 4, Issue 2

0 -- 0Huili Chen, Cheng Fu, Jishen Zhao, Farinaz Koushanfar. GALU: A Genetic Algorithm Framework for Logic Unlocking
0 -- 0Karim Lounis, Mohammad Zulkernine. Lessons Learned: Analysis of PUF-based Authentication Protocols for IoT
0 -- 0Lionel Morel, Damien Couroussé, Thomas Hiscock. Code Polymorphism Meets Code Encryption: Confidentiality and Side-channel Protection of Software Components
0 -- 0Robert A. Bridges, Sean Oesch, Michael D. Iannacone, Kelly M. T. Huffer, Brian Jewell, Jeffrey A. Nichols, Brian Weber, Miki E. Verma, Daniel Scofield, Craig Miles, Thomas Plummer, Mark Daniell, Anne M. Tall, Justin M. Beaver, Jared M. Smith. Beyond the Hype: An Evaluation of Commercially Available Machine Learning-based Malware Detectors
0 -- 0Pierre Graux, Jean-François Lalande, Valérie Viet Triem Tong, Pierre Wilke. OATs'inside: Retrieving Object Behaviors From Native-based Obfuscated Android Applications
0 -- 0Abdurhman Albasir, Kshirasagar Naik, Ricardo Manzano. Toward Improving the Security of IoT and CPS Devices: An AI Approach
0 -- 0Fran Casino, Nikolaos Totosis, Theodoros Apostolopoulos, Nikolaos Lykousas, Constantinos Patsakis. Analysis and Correlation of Visual Evidence in Campaigns of Malicious Office Documents
0 -- 0Jonathan Oakley 0001, Carl R. Worley, Lu Yu 0001, Richard R. Brooks, Ilker Özçelik, Anthony Skjellum, Jihad S. Obeid. Scrybe: A Secure Audit Trail for Clinical Trial Data Fusion
0 -- 0Girish Vaidya, T. V. Prabhakar 0001, Nithish K. Gnani, Ryan Shah, Shishir Nagaraja. Sensor Identification via Acoustic Physically Unclonable Function
0 -- 0Aydin Aysu, Scott R. Graham. Introduction to the Special Issue on the Digital Threats of Hardware Security
0 -- 0Thomas Walshe, Andrew Simpson 0001. Towards a Greater Understanding of Coordinated Vulnerability Disclosure Policy Documents
0 -- 0Poushali Sengupta, Sudipta Paul 0004, Subhankar Mishra. BUDS+: Better Privacy with Converger and Noisy Shuffling
0 -- 0S. S. Iyengar 0001, Bhavani Thuraisingham, Marek Zmuda. Special Issue on Actionable Information for Digital Threat Discovery Using Contextualized Data or Multi Sensor Data Fusion
0 -- 0Rajat Subhra Bhowmick, Rahul Indra, Isha Ganguli, Jayanta Paul, Jaya Sil. Breaking Captcha System with Minimal Exertion through Deep Learning: Real-time Risk Assessment on Indian Government Websites
0 -- 0Tor J. Langehaug, Brett J. Borghetti, Scott R. Graham. Classifying Co-resident Computer Programs Using Information Revealed by Resource Contention

Volume 4, Issue 1

0 -- 0Dimitrios Georgoulias, Jens Myrup Pedersen, Morten Falch, Emmanouil Vasilomanolakis. COVID-19 Vaccination Certificates in the Darkweb
0 -- 0Behnam Shobiri, Mohammad Mannan, Amr M. Youssef. CDNs' Dark Side: Security Problems in CDN-to-Origin Connections
0 -- 0Stefano Carnà, Serena Ferracci, Francesco Quaglia, Alessandro Pellegrini 0001. Fight Hardware with Hardware: Systemwide Detection and Mitigation of Side-channel Attacks Using Performance Counters
0 -- 0Henry Howland. CVSS: Ubiquitous and Broken
0 -- 0Alexander Staves, Antonios Gouglidis, David Hutchison 0001. An Analysis of Adversary-Centric Security Testing within Information and Operational Technology Environments
0 -- 0Alan Levine, Brett Alan Tucker. Zero Trust Architecture: Risk Discussion
0 -- 0Ricardo Alejandro Manzano Sanchez, Kshirasagar Naik, Abdurhman Albasir, Marzia Zaman, Nishith Goel. Detection of Anomalous Behavior of Smartphone Devices using Changepoint Analysis and Machine Learning Techniques
0 -- 0Luis Puche Rondon, Leonardo Babun, Ahmet Aris, Kemal Akkaya, A. Selcuk Uluagac. LGuard: Securing Enterprise-IoT Systems against Serial-Based Attacks via Proprietary Communication Buses
0 -- 0Saurabh Kumar 0007, Debadatta Mishra, Biswabandan Panda, Sandeep Kumar Shukla. InviSeal: A Stealthy Dynamic Analysis Framework for Android Systems
0 -- 0Moustafa Mahmoud, Mohammad Mannan, Amr M. Youssef. APTHunter: Detecting Advanced Persistent Threats in Early Stages
0 -- 0Maksim Ekin Eren, Juston S. Moore, Erik Skau, Elisabeth Moore, Manish Bhattarai, Gopinath Chennupati, Boian S. Alexandrov. General-purpose Unsupervised Cyber Anomaly Detection via Non-negative Tensor Factorization
0 -- 0Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco. The Role of Machine Learning in Cybersecurity
0 -- 0Mengfei Ren 0001, Xiaolei Ren 0001, Huadong Feng, Jiang Ming 0002, Yu Lei 0001. Security Analysis of Zigbee Protocol Implementation via Device-agnostic Fuzzing
0 -- 0Max Landauer, Markus Wurzenberger, Florian Skopik, Wolfgang Hotwagner, Georg Höld. AMiner: A Modular Log Data Analysis Pipeline for Anomaly-based Intrusion Detection
0 -- 0Ya Xiao, Yang Zhao, Nicholas Allen, Nathan Keynes, Danfeng (Daphne) Yao, Cristina Cifuentes. Industrial Experience of Finding Cryptographic Vulnerabilities in Large-scale Codebases