Abstract is missing.
- eBook Readers, Location Surveillance and the Threat to Freedom of AssociationStephen B. Wicker. [doi]
- Energy Attack in LoRaWAN: Experimental ValidationKonstantin Mikhaylov, Radek Fujdiak, Ari Pouttu, Miroslav Voznak, Lukas Malina, Petr Mlynek. [doi]
- Costing Secure Software Development: A Systematic Mapping StudyElaine Venson, Xiaomeng Guo, Zidi Yan, Barry W. Boehm. [doi]
- Adversarial Communication Networks Modeling for Intrusion Detection Strengthened against MimicryJorge Maestre Vidal, Marco Antonio Sotelo Monge. [doi]
- Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-WalksTobias Schmidbauer, Steffen Wendzel, Aleksandra Mileva, Wojciech Mazurczyk. [doi]
- SocialTruth Project Approach to Online Disinformation (Fake News) Detection and MitigationMichal Choras, Marek Pawlicki, Rafal Kozik, Konstantinos P. Demestichas, Pavlos Kosmides, Manik Gupta. [doi]
- Post-Quantum Cryptography in Embedded SystemsSoundes Marzougui, Juliane Krämer. [doi]
- Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled SystemsPeter Amthor, Daniel Fischer 0003, Winfried E. Kühnhauser, Dirk Stelzer. [doi]
- An Analysis Framework for Product Prices and Supplies in Darknet MarketplacesYork Yannikos, Julian Heeger, Maria Brockmeyer. [doi]
- Applicability of the IEC 62443 standard in Industry 4.0 / IIoTBjörn Leander, Aida Causevic, Hans Hansson. [doi]
- Model Driven Security in a Mobile Banking Application ContextSerafettin Sentürk, Hasan Yasar, Ibrahim Sogukpinar. [doi]
- Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party ComputationPradip Mainali, Carlton Shepherd. [doi]
- Semantic Mediation for A Posteriori Log AnalysisFarah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud. [doi]
- Protocol-independent Detection of "Messaging Ordering" Network Covert ChannelsSteffen Wendzel. [doi]
- A Misuse Pattern for Compromising VMs via Virtual Machine Escape in NFVAbdulrahman K. Alnaim, Ahmed M. Alwakeel, Eduardo B. Fernandez. [doi]
- An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability RequirementsFrancesco Buccafurri, Vincenzo De Angelis, Gianluca Lax, Lorenzo Musarella, Antonia Russo. [doi]
- Cyber Threat Information Sharing: Perceived Benefits and BarriersAdam Zibak, Andrew Simpson. [doi]
- Realistically Fingerprinting Social Media Webpages in HTTPS TrafficMariano Di Martino, Peter Quax, Wim Lamotte. [doi]
- Map My Murder: A Digital Forensic Study of Mobile Health and Fitness ApplicationsCourtney Hassenfeldt, Shabana Baig, Ibrahim M. Baggili, Xiaolu Zhang. [doi]
- Improved Manipulation Detection with Convolutional Neural Network for JPEG ImagesHuajian Liu, Martin Steinebach, Kathrin Schölei. [doi]
- AMON: an Automaton MONitor for Industrial Cyber-Physical SecurityGiuseppe Bernieri, Mauro Conti, Gabriele Pozzan. [doi]
- SET-OT: A Secure Equality Testing Protocol Based on Oblivious TransferFerhat Karakoç, Majid Nateghizad, Zekeriya Erkin. [doi]
- Revisiting Data Hiding Techniques for Apple File SystemThomas Göbel, Jan Türr, Harald Baier. [doi]
- Securing V2X Communications for the Future: Can PKI Systems offer the answer?Thanassis Giannetsos, Ioannis Krontiris. [doi]
- A Study of Network Forensic Investigation in Docker EnvironmentsDaniel Spiekermann, Tobias Eggendorfer, Jörg Keller 0001. [doi]
- Cyber Security Skill Set Analysis for Common Curricula DevelopmentMuhammad Mudassar Yamin, Basel Katt. [doi]
- The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case studyMarcus Botacin, Anatoli Kalysch, André Grégio. [doi]
- Building Taxonomies based on Human-Machine Teaming: Cyber Security as an ExampleMohamad Imad Mahaini, Shujun Li, Rahime Belen Saglam. [doi]
- Privacy-Enhancing Context Authentication from Location-Sensitive DataPradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas. [doi]
- Privacy and Robust HashesMartin Steinebach, Sebastian Lutz, Huajian Liu. [doi]
- Decision Support for Mission-Centric Cyber DefenceMichal Javorník, Jana Komárková, Martin Husák. [doi]
- Deep Learning-based Facial Detection and Recognition in Still Images for Digital ForensicsPatrício Domingues, Alexandre Frazão Rosário. [doi]
- IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research DirectionsTina Wu, Frank Breitinger, Ibrahim M. Baggili. [doi]
- Strong Tenant Separation in Cloud Computing PlatformsMichael Pfeiffer, Michael Rossberg, Simon Buttgereit, Guenter Schaefer. [doi]
- Thieves in the Browser: Web-based Cryptojacking in the WildMarius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck. [doi]
- Limits in the data for detecting criminals on social mediaAndrea Tundis, Leon Böck, Victoria Stanilescu, Max Mühlhäuser. [doi]
- A Location Privacy Analysis of Bluetooth MeshMatthias Caesar, Jan Steffan. [doi]
- PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM TamperingJunaid Iqbal, Ratinder Kaur, Natalia Stakhanova. [doi]
- The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projectsInger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun, Kalle Rindell. [doi]
- Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the WildMorteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled B. Shaban, Abdelkarim Erradi. [doi]
- Assessing the Applicability of Authorship Verification MethodsOren Halvani, Christian Winter 0001, Lukas Graner. [doi]
- The power of interpretation: Qualitative methods in cybersecurity researchDamjan Fujs, Anze Mihelic, Simon L. R. Vrhovec. [doi]
- Language-based Integration of Digital Forensics & Incident ResponseChristopher Stelly, Vassil Roussev. [doi]
- Zero Residual Attacks on Industrial Control Systems and Stateful CountermeasuresHamid Reza Ghaeini, Nils Ole Tippenhauer, Jianying Zhou. [doi]
- Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial EnvironmentsPooria Madani, Natalija Vlajic. [doi]
- Behavior-Aware Network Segmentation using IP FlowsJuraj Smeriga, Tomás Jirsík. [doi]
- Anonymous Identity Based Encryption with Traceable IdentitiesOlivier Blazy, Laura Brouilhet, Duong Hieu Phan. [doi]
- On the Exploitation of Online SMS Receiving Services to Forge ID VerificationMd. Hajian Berenjestanaki, Mauro Conti, Ankit Gangwal. [doi]
- Does "www." Mean Better Transport Layer Security?Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin. [doi]
- A Pattern for a Virtual Network Function (VNF)Ahmed M. Alwakeel, Abdulrahman K. Alnaim, Eduardo B. Fernandez. [doi]
- Ontology of Metrics for Cyber Security AssessmentElena Doynikova, Andrey Fedorchenko, Igor V. Kotenko. [doi]
- Managing the Overestimation of ResilienceThomas Clédel, Nora Cuppens, Frédéric Cuppens. [doi]
- Location Tracking Using Smartphone Accelerometer and Magnetometer TracesKhuong An Nguyen, Raja Naeem Akram, Konstantinos Markantonakis, Zhiyuan Luo, Chris Watkins. [doi]
- Framework for Anticipatory Self-Protective 5G EnvironmentsJorge Maestre Vidal, Marco Antonio Sotelo Monge. [doi]
- E2E Verifiable Borda Count Voting System without Tallying AuthoritiesSamiran Bag, Muhammad Ajmal Azad, Feng Hao. [doi]
- STAMAD: a STAtic MAlware DetectorKhanh-Huu-The Dam, Tayssir Touili. [doi]
- Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital BankingCaroline Moeckel. [doi]
- Using Context and Provenance to defend against USB-borne attacksTobias Mueller, Ephraim Zimmer, Ludovico de Nittis. [doi]
- Towards a framework for detecting advanced Web botsChristos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Yiannis Kompatsiaris. [doi]
- Detecting DGA domains with recurrent neural networks and side informationRyan R. Curtin, Andrew B. Gardner, Slawomir Grzonkowski, Alexey Kleymenov, Alejandro Mosquera. [doi]
- Alexa's Voice Recording Behavior: A Survey of User Understanding and AwarenessYousra Javed, Shashank Sethi, Akshay Jadoun. [doi]
- Characterizing the Redundancy of DarkWeb .onion ServicesPavlo Burda, Coen Boot, Luca Allodi. [doi]
- A Secure Publish/Subscribe Protocol for Internet of ThingsLukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak. [doi]
- NERD: Network Entity Reputation DatabaseVáclav Bartos. [doi]
- Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade MicrocontrollersLucian Popa 0003, Bogdan Groza, Pal-Stefan Murvay. [doi]
- Sniffing Detection within the Network: Revisiting Existing and Proposing Novel ApproachesKrzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski. [doi]
- Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability ResearchDonatello Luna, Luca Allodi, Marco Cremonini. [doi]
- GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing PlatformMartin Horák, Václav Stupka, Martin Husák. [doi]
- Practical Group-Signatures with Privacy-Friendly OpeningsStephan Krenn, Kai Samelin, Christoph Striecks. [doi]
- Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration TestingRalph Ankele, Stefan Marksteiner, Kai Nahrgang, Heribert Vallant. [doi]
- Enhancing credibility of digital evidence through provenance-based incident response handlingLudwig Englbrecht, Gregor Langner, Günther Pernul, Gerald Quirchmayr. [doi]
- Blockchain Trilemma Solver Algorand has Dilemma over Undecidable MessagesMauro Conti, Ankit Gangwal, Michele Todero. [doi]
- Automated Pattern Inference Based on Repeatedly Observed Malware ArtifactsChristian Doll, Arnold Sykosch, Marc Ohm, Michael Meier 0001. [doi]
- IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT DevicesMusa G. Samaila, Moser Z. V. José, João B. F. Sequeiros, Mário M. Freire, Pedro R. M. Inácio. [doi]
- Obfuscation-Resilient Code Recognition in Android AppsJohannes Feichtner, Christof Rabensteiner. [doi]
- Federated Identity Management and Interoperability for Heterogeneous Cloud Platform EcosystemsNirojan Selvanathan, Dileepa Jayakody, Violeta Damjanovic-Behrendt. [doi]
- Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on UndetectabilityKrzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski. [doi]
- DEMISe: Interpretable Deep Extraction and Mutual Information Selection Techniques for IoT Intrusion DetectionLuke R. Parker, Paul D. Yoo, Taufiq A. Asyhari, Lounis Chermak, Yoonchan Jhi, Kamal Taha. [doi]
- Towards Reversible Storage Network Covert ChannelsWojciech Mazurczyk, Przemyslaw Szary, Steffen Wendzel, Luca Caviglione. [doi]
- Using Temporal and Topological Features for Intrusion Detection in Operational NetworksSimon D. Duque Antón, Daniel Fraunholz, Hans Dieter Schotten. [doi]
- Analyzing Android's File-Based Encryption: Information Leakage through Unencrypted MetadataTobias Groß, Matanat Ahmadova, Tilo Müller. [doi]
- Plug-and-Patch: Secure Value Added Services for Electric Vehicle ChargingLucas Buschlinger, Markus Springer, Maria Zhdanova. [doi]
- A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence SourcesThomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, Gerald Quirchmayr. [doi]
- Detection and Analysis of Tor Onion ServicesMartin Steinebach, Marcel Schäfer, Alexander Karakuz, Katharina Brandl, York Yannikos. [doi]
- Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive CorruptionsOlivier Blazy, Céline Chevalier, Quoc Huy Vu. [doi]
- DTE Access Control Model for Integrated ICS SystemsKhaoula Es-Salhi, David Espes, Nora Cuppens. [doi]
- Applying Security Testing Techniques to Automotive EngineeringIrdin Pekaric, Clemens Sauerwein, Michael Felderer. [doi]
- A Systematic Analysis of User Evaluations in Security ResearchPeter Hamm, David Harborth, Sebastian Pape 0001. [doi]
- A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures: A Secure Software PerspectiveJulien Proy, Karine Heydemann, Alexandre Berzati, Fabien Majéric, Albert Cohen 0001. [doi]
- HEHLKAPPE: Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-TimeAlexander Aigner, Rene Zeller. [doi]
- On the Utility of Synthetic Data: An Empirical Evaluation on Machine Learning TasksMarkus Hittmeir, Andreas Ekelhart, Rudolf Mayer. [doi]
- 6G Network Needs to Support Embedded TrustRaimo Kantola. [doi]
- Leveraging Kernel Security Mechanisms to Improve Container Security: a SurveyMaxime Bélair, Sylvie Laniepce, Jean-Marc Menaud. [doi]
- Black Box Attacks on Deep Anomaly DetectorsAditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac. [doi]
- Fake News Detection by Image Montage RecognitionMartin Steinebach, Karol Gotkowski, Hujian Liu. [doi]
- Towards a Security Architecture for Hybrid WMNsMarkus Theil, Martin Backhaus, Michael Rossberg, Guenter Schaefer. [doi]
- Improving Borderline Adulthood Facial Age Estimation through Ensemble LearningFelix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon. [doi]
- Managing Security in Software: Or: How I Learned to Stop Worrying and Manage the Security Technical DebtKalle Rindell, Karin Bernsmed, Martin Gilje Jaatun. [doi]
- Efficient Attack Countermeasure Selection Accounting for Recovery and Action CostsJukka Soikkeli, Luis Muñoz-González, Emil Lupu. [doi]
- AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection AlertsMartin Husák, Jaroslav Kaspar. [doi]
- Preserving context security in AWS IoT CoreLuca Calderoni. [doi]
- Large-Scale Analysis of Pop-Up Scam on Typosquatting URLsTobias Dam, Lukas Daniel Klausner, Damjan Buhov, Sebastian Schrittwieser. [doi]
- IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systemsAhmad Atamli, Giuseppe Petracca, Jon Crowcroft. [doi]
- Securing the Device Drivers of Your Embedded Systems: Framework and PrototypeZhuohua Li, Jincheng Wang, Mingshen Sun, John C. S. Lui. [doi]
- Securing Ethernet-based Optical Fronthaul for 5G NetworkJoo Yeon Cho, Andrew Sergeev, Jim Zou. [doi]
- Learning Software Security in Context: An Evaluation in Open Source Software Development EnvironmentShao-Fang Wen, Basel Katt. [doi]
- Towards Efficient Reconstruction of Attacker Lateral MovementFlorian Wilkens, Steffen Haas, Dominik Kaaser, Peter Kling, Mathias Fischer 0001. [doi]
- Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic ArtefactsXiaoyu Du, Mark Scanlon. [doi]