Journal: DTRAP

Volume 5, Issue 4

0 -- 0Moya Kate Baldry, Jassim Happa, Anthony Steed, Simon Smith 0002, Mashhuda Glencross. From Embodied Abuse to Mass Disruption: Generative, Inter-Reality Threats in Social, Mixed-Reality Platforms
0 -- 0Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla. TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports
0 -- 0Robin Buchta, Georgios Gkoktsis, Felix Heine, Carsten Kleiner. Advanced Persistent Threat Attack Detection Systems: A Review of Approaches, Challenges, and Trends
0 -- 0Akaki Tsunoda. Investigating Threats Posed by SMS Origin Spoofing to IoT Devices
0 -- 0Luke Harrison, Samiran Bag, Hang Luo 0001, Feng Hao 0001. VERICONDOR: End-to-End Verifiable Condorcet Voting with support for Strict Preference and Indifference
0 -- 0Marcus Botacin. Fuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments
0 -- 0Aakash Varma Nadimpalli, Ajita Rattani. Social Media Authentication and Combating Deepfakes Using Semi-Fragile Invisible Image Watermarking

Volume 5, Issue 3

0 -- 0Rodney Adriko, Jason R. C. Nurse. Does Cyber Insurance Promote Cyber Security Best Practice? An Analysis Based on Insurance Application Forms
0 -- 0Jakob Stühn, Jan-Niclas Hilgert, Martin Lambertz. The Hidden Threat: Analysis of Linux Rootkit Techniques and Limitations of Current Detection Tools
0 -- 0Andreas Dewald, Thomas Schreck. Introduction to the IMF 2024 Special Issue
0 -- 0Christian Lindenmeier, Jan Gruber, Felix C. Freiling. InvesTEE: A TEE-supported Framework for Lawful Remote Forensic Investigations
0 -- 0Markus Demmel, Thomas Göbel, Patrik Gonçalves, Harald Baier. Data Synthesis Is Going Mobile - On Community-Driven Dataset Generation for Android Devices
0 -- 0Venkata Sai Charan Putrevu, Subhasis Mukhopadhyay, Subhajit Manna, Nanda Rani, Ansh Vaid, Hrushikesh Chunduri, Mohan Anand Putrevu, Sandeep K. Shukla. ADAPT: Adaptive Camouflage Based Deception Orchestration For Trapping Advanced Persistent Threats
0 -- 0Tor J. Langehaug, Scott R. Graham. CuMONITOR: Continuous Monitoring of Microarchitecture for Software Task Identification and Classification
0 -- 0Mehdi Akbari Gurabi, Lasse Nitz, Andrej Bregar, Jan Popanda, Christian Siemers, Roman Matzutt, Avikarsha Mandal. Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation
0 -- 0Richard Derbyshire, Benjamin Green 0001, Charl van der Walt, David Hutchison 0001. Dead Man's PLC: Towards Viable Cyber Extortion for Operational Technology
0 -- 0Benjamin E. Bagozzi, Rajni Goel, Brunilda Lugo-de-Fabritz, Kelly Knickmeier-Cummings, Karthik Balasubramanian. A Framework for Enhancing Social Media Misinformation Detection with Topical-Tactics
0 -- 0Lisa Rzepka, Jenny Ottmann, Felix C. Freiling, Harald Baier. Causal Inconsistencies Are Normal in Windows Memory Dumps (Too)
0 -- 0Andreas Hammer 0003, Christian Cerny, Christoph Jung, Christian Eichenmüller, Felix C. Freiling. Increasing Street Credibility: Cartography-Aware Forensic Analysis of GNSS Trace Validity
0 -- 0Julia Wunder, Alan Corona, Andreas Hammer 0003, Zinaida Benenson. On NVD Users' Attitudes, Experiences, Hopes, and Hurdles
0 -- 0Andreas Hammer 0003, Julian Geus, Florian Nicolai, Philip Schütz, Christofer Fein, Felix C. Freiling. Fit for Forensics: Taxonomy and Common Model for Forensic Analysis of Fitness Trackers

Volume 5, Issue 2

0 -- 0Saikiran Subbagari. Counter Measures to Combat Money Laundering in the New Digital Age
0 -- 0Martina Lindorfer, Gianluca Stringhini. Introduction to the ACSAC'22 Special Issue
0 -- 0Yechan Bae, Sarbartha Banerjee, Sangho Lee 0001, Marcus Peinado. Spacelord: Private and Secure Smart Space Sharing
0 -- 0Jing Xu 0028, Stefanos Koffas, Stjepan Picek. Unveiling the Threat: Investigating Distributed and Centralized Backdoor Attacks in Federated Graph Neural Networks
0 -- 0Clement Chimezie Aladi. Web Application Security: A Pragmatic Exposé
0 -- 0Douglas Everson, Long Cheng 0005. A Survey on Network Attack Surface Mapping
0 -- 0Ying Yuan 0002, Giovanni Apruzzese, Mauro Conti. Multi-SpacePhish: Extending the Evasion-space of Adversarial Attacks against Phishing Website Detectors Using Machine Learning
0 -- 0Jalal Ghadermazi, Ankit Shah 0002, Sushil Jajodia. A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center

Volume 5, Issue 1

0 -- 0Thalita Scharr Rodrigues Pimenta, Fabricio Ceschin, Andre Gregio. ANDROIDGYNY: Reviewing Clustering Techniques for Android Malware Family Classification
0 -- 0Scarlett Taviss, Steven H. H. Ding, Mohammad Zulkernine, Philippe Charland, Sudipta Acharya. Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis
0 -- 0Sagar Samtani, Edward Raff, Hyrum S. Anderson. Applied Machine Learning for Information Security
0 -- 0Rucha Bhalchandra Joshi, Subhankar Mishra. Locally and Structurally Private Graph Neural Networks
0 -- 0Andrew E. Hong, Peter P. Malinovsky, Suresh K. Damodaran. Towards Attack Detection in Multimodal Cyber-Physical Systems with Sticky HDP-HMM based Time Series Analysis
0 -- 0Erik Hemberg, Matthew J. Turner, Nick Rutar, Una-May O'Reilly. Enhancements to Threat, Vulnerability, and Mitigation Knowledge for Cyber Analytics, Hunting, and Simulations
0 -- 0Yurong Chen 0005, Yongsheng Mei, Tian Lan, Guru Venkataramani. Exploring Effective Fuzzing Strategies to Analyze Communication Protocols
0 -- 0Eva Domschot, Ramyaa Ramyaa, Michael R. Smith 0002. Improving Automated Labeling for ATT&CK Tactics in Malware Threat Reports
0 -- 0Fabrício Ceschin, Marcus Botacin, Albert Bifet, Bernhard Pfahringer, Luiz S. Oliveira, Heitor Murilo Gomes, André Grégio. Machine Learning (In) Security: A Stream of Problems
0 -- 0Yang Gao, Benjamin M. Ampel, Sagar Samtani. Evading Anti-Phishing Models: A Field Note Documenting an Experience in the Machine Learning Security Evasion Competition 2022
0 -- 0Akaki Tsunoda. Demonstrating Spoofability of an Originating Number when Sending an SMS using SMPP
0 -- 0Ethan M. Rudd, David Krisiloff, Scott E. Coull, Daniel Olszewski, Edward Raff, James Holt. Efficient Malware Analysis Using Metric Embeddings