388 | -- | 409 | Jack Laurie Tilbury, Stephen Flowerday. Humans and Automation: Augmenting Security Operation Centers |
410 | -- | 448 | Paolo Modesti, Lewis Golightly, Louis Holmes, Chidimma Opara, Marco Moscini. Bridging the Gap: A Survey and Classification of Research-Informed Ethical Hacking Tools |
449 | -- | 467 | Mamadou Kasse, Rodolphe Charrier, Alexandre Berred, Cyrille Bertelle, Christophe Delpierre. An Approach for Anomaly Detection in Network Communications Using k-Path Analysis |
468 | -- | 493 | Abdelouadoud Stambouli, Luigi Logrippo. Implementation of a Partial-Order Data Security Model for the Internet of Things (IoT) Using Software-Defined Networking (SDN) |
494 | -- | 517 | Eduardo Pina, José Ramos, Henrique Jorge, Paulo Váz, José Silva, Cristina Wanzeller, Maryam Abbasi, Pedro Martins 0003. Data Privacy and Ethical Considerations in Database Management |
518 | -- | 545 | Charalampos Bratsas, Efstathios Konstantinos Anastasiadis, Alexandros K. Angelidis, Lazaros Ioannidis, Rigas Kotsakis, Stefanos Ougiaroglou. Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review |
546 | -- | 571 | Jack Kolenbrander, Ethan Husmann, Christopher Henshaw, Elliott Rheault, Madison G. Boswell, Alan J. Michaels. Use & Abuse of Personal Information, Part II: Robust Generation of Fake IDs for Privacy Experimentation |
572 | -- | 593 | Elliott Rheault, Mary Nerayo, Jaden Leonard, Jack Kolenbrander, Christopher Henshaw, Madison G. Boswell, Alan J. Michaels. Use and Abuse of Personal Information, Part I: Design of a Scalable OSINT Collection Engine |
594 | -- | 614 | Christopher R. Sears, Daniel R. Cunningham. Individual Differences in Psychological Stress Associated with Data Breach Experiences |
615 | -- | 628 | Alan Mills, Jonathan White, Phil Legg. GoibhniUWE: A Lightweight and Modular Container-Based Cyber Range |
629 | -- | 649 | Antonio Francesco Gentile, Davide Macrì, Emilio Greco, Peppino Fazio. IoT IP Overlay Network Security Performance Analysis with Open Source Infrastructure Deployment |
650 | -- | 662 | Chatphat Titiakarawongse, Sasiyaporn Taksin, Jidapa Ruangsawat, Kunthida Deeduangpan, Sirapat Boonkrong. Comparative Vulnerability Analysis of Thai and Non-Thai Mobile Banking Applications |
663 | -- | 677 | A. M. Mahmud Chowdhury, Md Jahangir Alam Khondkar, Masudul Haider Imtiaz. Advancements in Synthetic Generation of Contactless Palmprint Biometrics Using StyleGAN Models |
678 | -- | 730 | Fahad Alotaibi, Ramesh K. Karne, Alexander L. Wijesinha, Nirmala Soundararajan, Abhishek Rangi. An Evaluation of the Security of Bare Machine Computing (BMC) Systems against Cybersecurity Attacks |
731 | -- | 761 | Zlatan Moric, Vedran Dakic, Daniela Djekic, Damir Regvart. Protection of Personal Data in the Context of E-Commerce |
762 | -- | 776 | Erik William Tomlinson, Wolday Abrha, Seong Dae Kim, Salvador A. Ortega. Cybersecurity Access Control: Framework Analysis in a Healthcare Institution |