Abstract is missing.
- Secure Equality Testing Protocols in the Two-Party SettingMajid Nateghizad, Thijs Veugen, Zekeriya Erkin, Reginald L. Lagendijk. [doi]
- Practical Precise Taint-flow Static Analysis for Android App SetsWilliam Klieber, Lori Flynn, Will Snavely, Michael Zheng. [doi]
- A novel Self-Organizing Network solution towards Crypto-ransomware MitigationMarco Antonio Sotelo Monge, Jorge Maestre Vidal, Luis Javier García-Villalba. [doi]
- Evaluating the degree of security of a system built using security patternsEduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki. [doi]
- Converting Unstructured System Logs into Structured Event List for Anomaly DetectionZongze Li, Matthew Davidson, Song Fu, Sean Blanchard, Michael Lang 0003. [doi]
- A Pyramidal-based Model to Compute the Impact of Cyber Security EventsGustavo Gonzalez Granadillo, Jose Rubio-Hernan, Joaquín García-Alfaro. [doi]
- The Mouseworld, a security traffic analysis lab based on NFV/SDNAntonio Pastor, Alberto Mozo, Diego R. Lopez, Jesús Folgueira, Angeliki Kapodistria. [doi]
- X.509 Certificate Error TestingD. McLuskie, X. Belleken. [doi]
- Toward a Distributed Trust Management scheme for VANETAmira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi. [doi]
- Security Wrapper Orchestration in CloudAapo Kalliola, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, Tuomas Aura. [doi]
- Digitally Signed and Permission Restricted PDF Files: a Case Study on Digital ForensicsPatrício Domingues, Miguel Frade. [doi]
- Evaluation of Apache Spot's machine learning capabilities in an SDN/NFV enabled environmentChristos M. Mathas, Olga E. Segou, Georgios Xilouris, Dimitris Christinakis, Michail-Alexandros Kourtis, Costas Vassilakis, Anastasios Kourtis. [doi]
- HYDRA: Hypothesis Driven Repair AutomationBrett Benyo, Shane S. Clark, Aaron Paulos, Partha P. Pal. [doi]
- Cybercrime and Organized CrimeVáclav Jirovský, Andrej Pastorek, Max Mühlhäuser, Andrea Tundis. [doi]
- A Meta Language for Threat Modeling and Attack SimulationsPontus Johnson, Robert Lagerström, Mathias Ekstedt. [doi]
- Mission-Centric Risk Assessment to Improve Cyber Situational AwarenessF. R. L. Silva, P. Jacob. [doi]
- Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board NetworksMartin Salfer, Claudia Eckert. [doi]
- Let's shock our IoT's heart: ARMv7-M under (fault) attacksSebanjila Kevin Bukasa, Ronan Lashermes, Jean-Louis Lanet, Axel Legay. [doi]
- Towards Distributed Network Covert Channels Detection Using Data Mining-based ApproachKrzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski. [doi]
- New authentication concept using certificates for big data analytic toolsPaul J. E. Velthuis, Marcel Schäfer, Martin Steinebach. [doi]
- Reputation-Based Security System For Edge ComputingFrancis N. Nwebonyi, Rolando Martins, Manuel Eduardo Correia. [doi]
- Enhancing Cybersecurity by Safeguarding Information Privacy: The European Union and the Implementation of the "Data Protection by Design" ApproachMatteo E. Bonfanti. [doi]
- Keys in the Clouds: Auditable Multi-device Access to Cryptographic CredentialsArseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan. [doi]
- Identity and Access Control for micro-services based 5G NFV platformsDaniel Guija, Muhammad Shuaib Siddiqui. [doi]
- Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure?Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer. [doi]
- A Nlp-based Solution to Prevent from Privacy Leaks in Social Network PostsGerardo Canfora, Andrea Di Sorbo, Enrico Emanuele, Sara Forootani, Corrado Aaron Visaggio. [doi]
- Enhancing NFV Orchestration with Security PoliciesFlorian Wendland, Christian Banse. [doi]
- A Framework for Monitoring Net NeutralityWilfried Mayer, Thomas Schreiber, Edgar R. Weippl. [doi]
- Challenges of Cryptocurrencies Forensics: A Case Study of Investigating, Evidencing and Prosecuting Organised CybercriminalsS. Naqvi. [doi]
- A Reactive Defense Against Bandwidth Attacks Using Learning AutomataNafiseh Kahani, Mehran S. Fallah. [doi]
- Conceptualizing the digital TAKEDOWN platforms for supporting first-line-practitioners and law enforcement agenciesFlorian Huber. [doi]
- Robustness Estimation of Infrastructure Networks: On the Usage of Degree CentralitySebastian Wandelt, Xiaoqian Sun. [doi]
- The user-centered privacy-aware control system PRICON: An interdisciplinary evaluationJonas Walter, Bettina Abendroth, Thilo Von Pape, Christian Plappert, Daniel Zelle, Christoph Krauß, G. Gagzow, Hendrik Decke. [doi]
- Denial-of-Service Attacks on LoRaWANEef van Es, Harald P. E. Vranken, Arjen Hommersom. [doi]
- Evolution Oriented Monitoring oriented to Security Properties for Cloud ApplicationsJamal Toutouh, Antonio Muñoz, Sergio Nesmachnow. [doi]
- Privacy and DRM Requirements for Collaborative Development of AI ApplicationsVida Ahmadi Mehri, Dragos Ilie, Kurt Tutschku. [doi]
- Definitions for Plaintext-Existence Hiding in Cloud StorageColin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani. [doi]
- Channel SteganalysisMartin Steinebach, Andre Ester, Huajian Liu. [doi]
- An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption SchemeMasoomeh Sepehri, Alberto Trombetta, Maryam Sepehri, Ernesto Damiani. [doi]
- Mission-Centric Automated Cyber Red TeamingSuneel Randhawa, Benjamin Turnbull, Joseph Yuen, Jonathan Dean. [doi]
- There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User SettingDavid Berend, Shivam Bhasin, Bernhard Jungk. [doi]
- I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You OutGokila Dorai, Shiva Houshmand, Ibrahim M. Baggili. [doi]
- Towards Wireless Secret key Agreement with LoRa Physical LayerHenri Ruotsalainen, Stepan Grebeniuk. [doi]
- Fully-Featured Anonymous Credentials with Reputation SystemKai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig, Marcel Stienemeier. [doi]
- Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETsOns Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi. [doi]
- ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN BusTianxiang Huang, Jianying Zhou 0001, Andrei Bytes. [doi]
- Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography ResearchSteffen Wendzel. [doi]
- An investigation of a deep learning based malware detection systemMohit Sewak, Sanjay K. Sahay, Hemant Rathore. [doi]
- Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud ServersOmid Mir, René Mayrhofer, Michael Hölzl, Thanh Binh Nguyen. [doi]
- A Process Framework for Stakeholder-specific Visualization of Security MetricsTanja Hanauer, Wolfgang Hommel, Stefan Metzger, Daniela Pöhn. [doi]
- Surveying Secure Software Development Practices in FinlandKalle Rindell, Jukka Ruohonen, Sami Hyrynsalmi. [doi]
- Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry DomainsMusa G. Samaila, João B. F. Sequeiros, Mário M. Freire, Pedro R. M. Inácio. [doi]
- Ransomware's Early Mitigation MechanismsRouta Moussaileb, Benjamin Bouget, Aurélien Palisse, Hélène Le Bouder, Nora Cuppens, Jean-Louis Lanet. [doi]
- Framework for Security Event Management in 5GI. Adam, J. Ping. [doi]
- Hunting Observable Objects for Indication of CompromiseArnold Sykosch, Marc Ohm, Michael Meier 0001. [doi]
- User privacy attitudes regarding proximity sensingHåkan Jonsson, Carl Magnus Olsson. [doi]
- Monitoring Product Sales in Darknet ShopsYork Yannikos, Annika Schäfer, Martin Steinebach. [doi]
- ToGather: Automatic Investigation of Android Malware Cyber-InfrastructuresElMouatez Billah Karbab, Mourad Debbabi. [doi]
- Influence Factors on the Quality of User Experience in OS Reliability: A Qualitative Experimental StudyDaniela Yabe, Caio Augusto Rodrigues dos Santos, Lucas Miranda, Rivalino Matias Jr.. [doi]
- Protecting Patients' Data: An Efficient Method for Health Data PrivacyMark Daniels, John Rose, Csilla Farkas. [doi]
- Software Security Activities that Support Incident Management in Secure DevOpsMartin Gilje Jaatun. [doi]
- CDFEDT: Comparison of Data Flow Error Detection Techniques in Embedded Systems: an Empirical StudyVenu Babu Thati, Jens Vankeirsbilck, Niels Penneman, Davy Pissoort, Jeroen Boydens. [doi]
- Critical Analysis of LPL according to Articles 12 - 14 of the GDPRArmin Gerl, Dirk Pohl. [doi]
- (In)Secure Configuration Practices of WPA2 Enterprise SupplicantsAlberto Bartoli, Eric Medvet, Andrea De Lorenzo, Fabiano Tarlao. [doi]
- Stealthy Attacks on Smart Grid PMU State EstimationSarita Paudel, Paul Smith, Tanja Zseby. [doi]
- Cloud Architectures for Searchable EncryptionJohannes Blömer, Nils Löken. [doi]
- Improved RNS-based PRNGsAlan J. Michaels. [doi]
- Recent Granular Computing Implementations and its Feasibility in Cybersecurity DomainMarek Pawlicki, Michal Choras, Rafal Kozik. [doi]
- A reference architecture for the container ecosystemMadiha H. Syed, Eduardo B. Fernández. [doi]
- Towards Deriving Insights into Data Hiding Methods Using Pattern-based ApproachWojciech Mazurczyk, Steffen Wendzel, Krzysztof Cabaj. [doi]
- Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a ServiceGregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, Pascal Bisson. [doi]
- Non-Interactive Key Exchange from Identity-Based EncryptionOlivier Blazy, Céline Chevalier. [doi]
- Learning Malware Using Generalized Graph KernelsKhanh-Huu-The Dam, Tayssir Touili. [doi]
- A GDPR compliance module for supporting the exchange of information between CERTsOtto Hellwig, Gerald Quirchmayr, Walter Hötzendorfer, Christof Tschohl, Edith Huber, Franz Vock, Florian Nentwich, Bettina Pospisil, Matthias Gusenbauer, Gregor Langner. [doi]
- Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels?Christian Kraetzer, Jana Dittmann. [doi]
- A Simulation Tool for Cascading Effects in Interdependent Critical InfrastructuresThomas Grafenauer, Sandra König, Stefan Rass, Stefan Schauer. [doi]
- Attack Difficulty Metric for Assessment of Network SecurityPreetam Mukherjee 0001, Chandan Mazumdar. [doi]
- Enterprise WLAN Security Flaws: Current Attacks and relative MitigationsMohamed A. Abo-Soliman, Marianne A. Azer. [doi]
- CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development LifecycleThomas Lorünser, Henrich C. Pöhls, Leon Sell, Thomas Laenger. [doi]
- To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G NetworksRobert Annessi, Joachim Fabini, Tanja Zseby. [doi]
- Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely UnderstoodFarzaneh Karegar, John Sören Pettersson, Simone Fischer-Hübner. [doi]
- The challenge of detecting sophisticated attacks: Insights from SOC AnalystsOlusola Akinrolabu, Ioannis Agrafiotis, Arnau Erola. [doi]
- Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise EnvironmentsNikolaos Tsinganos, Georgios Sakellariou, Panagiotis E. Fouliras, Ioannis Mavridis. [doi]
- Risks of Sharing Cyber Incident InformationAdham Albakri, Eerke A. Boiten, Rogério de Lemos. [doi]
- Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity MeasuresAnatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Müller. [doi]
- Spreading Alerts Quietly: New Insights from Theory and PracticeOlivier Blazy, Céline Chevalier. [doi]
- Investigating the Use of Online Open Source Information as Evidence in European CourtsYi-Ching Liao. [doi]
- A review of network vulnerabilities scanning tools: types, capabilities and functioningAndrea Tundis, Wojciech Mazurczyk, Max Mühlhäuser. [doi]
- FALKE-MC: A Neural Network Based Approach to Locate Cryptographic Functions in Machine CodeAlexander Aigner. [doi]
- Universal Trusted Execution Environments for Securing SDN/NFV OperationsVincent Lefebvre, Gianni Santinelli, Tilo Müller, Johannes Götzfried. [doi]
- Forensic APFS File RecoveryJonas Plum, Andreas Dewald. [doi]
- Speeding Up Bug Finding using Focused FuzzingUlf Kargen, Nahid Shahmehri. [doi]
- Anonymous Charging and Billing of Electric VehiclesDaniel Zelle, Markus Springer, Maria Zhdanova, Christoph Krauß. [doi]
- Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data SetSimon Duque Antón, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten. [doi]
- On Track of Sigfox Confidentiality with End-to-End EncryptionRadek Fujdiak, Petr Blazek, Konstantin Mikhaylov, Lukas Malina, Petr Mlynek, Jiri Misurec, Vojtech Blazek. [doi]
- Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environmentsJorge Maestre Vidal, Marco Antonio Sotelo Monge, Luis Javier García-Villalba. [doi]
- Towards In-Network Security for Smart HomesMartin Serror, Martin Henze, Sacha Hack, Marko Schuba, Klaus Wehrle. [doi]
- A New Classification of Attacks against the Cyber-Physical Security of Smart GridsGhada Elbez, Hubert B. Keller, Veit Hagenmeyer. [doi]
- Assessing Internet-wide Cyber Situational Awareness of Critical SectorsMartin Husák, Nataliia Neshenko, Morteza Safaei Pour, Elias Bou-Harb, Pavel Celeda. [doi]
- Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure SelectionElena Doynikova, Andrey Fedorchenko, Igor V. Kotenko. [doi]
- Augmented DDoS Mitigation with Reputation ScoresTomás Jánský, Tomás Cejka, Martin Zádník, Václav Bartos. [doi]
- Digital Forensics in the Next Five YearsLaoise Luciano, Ibrahim M. Baggili, Mateusz Topor, Peter Casey, Frank Breitinger. [doi]
- Integrating Threat Intelligence to Enhance an Organization's Information Security ManagementMathias Gschwandtner, Lukas Demetz, Matthias Gander, Ronald Maier. [doi]
- Distributed and Cooperative firewall/controller in cloud environmentsFerdaous Kamoun-Abid, Amel Meddeb-Makhlouf, Faouzi Zarai, Guizani. [doi]
- Architectural Solutions to Mitigate Security Vulnerabilities in Software SystemsPriya Anand, Jungwoo Ryoo. [doi]
- Towards an Automatic Generation of Low-Interaction Web Application HoneypotsMarius Musch, Martin Härterich, Martin Johns. [doi]
- The AWID prevention approach: The generation of a holistic good practice model for prevention of radicalization in youth workDiana Silvestru, Karin Rainer, Mario Springnagel. [doi]
- Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer MonitorsAsanka Sayakkara, Nhien-An Le-Khac, Mark Scanlon. [doi]
- Correlation Power Analysis on the PRESENT Block Cipher on an Embedded DeviceOwen Lo, William J. Buchanan, Douglas Carson. [doi]
- Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud ServicesHeng Zhang, Jesus Luna, Neeraj Suri, Rubén Trapero. [doi]
- Behavioural Comparison of Systems for Anomaly DetectionMartin Pirker, Patrick Kochberger, Stefan Schwandter. [doi]
- IoT Forensic: identification and classification of evidence in criminal investigationsFrançois Bouchaud, Gilles Grimaud, Thomas Vantroys. [doi]
- Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic ImagesHuy H. Nguyen, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Vincent Nozick, Junichi Yamagishi, Isao Echizen. [doi]
- Breaking down violence: A deep-learning strategy to model and classify violence in videosBruno Malveira Peixoto, Sandra Avila, Zanoni Dias, Anderson Rocha. [doi]
- The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining CampaignsJulian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger, Hyoungshick Kim. [doi]
- Towards Utilization of Covert Channels as a Green Networking TechniqueDaniel Geisler, Wojciech Mazurczyk, Jörg Keller 0001. [doi]
- Adding Salt to Pepper: A Structured Security Assessment over a Humanoid RobotAlberto Giaretta, Michele De Donno, Nicola Dragoni. [doi]
- Discovering software vulnerabilities using data-flow analysis and machine learningJorrit Kronjee, Arjen Hommersom, Harald P. E. Vranken. [doi]
- Detection of Obfuscation Techniques in Android ApplicationsAlessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo. [doi]
- Secure Fixed-point Division for Homomorphically Encrypted OperandsChibuike Ugwuoke, Zekeriya Erkin, Reginald L. Lagendijk. [doi]
- Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based RootkitsJacob Taylor, Benjamin Turnbull, Gideon Creech. [doi]
- CRUSOE: Data Model for Cyber Situational AwarenessJana Komárková, Martin Husák, Martin Lastovicka, Daniel Tovarnák. [doi]
- Challenges and mitigation approaches for getting secured applications in an enterprise companyPawel Rajba. [doi]
- Android authorship attribution through string analysisVaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook, Alina Matyukhina. [doi]
- Attribute Based Content Security and Caching in Information Centric IoTNurefsan Sertbas, Samet Aytaç, Orhan Ermis, Fatih Alagöz, Gürkan Gür. 34 [doi]
- Evidence Identification in Heterogeneous Data Using ClusteringHussam Jasim Mohammed, Nathan L. Clarke, Fudong Li. 35 [doi]
- What are Security Patterns?: A Formal Model for Security and Design of SoftwareAnika Behrens. 35 [doi]
- SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light SystemKrzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski. 49 [doi]