Abstract is missing.
- AntiPatterns regarding the application of cryptographic primitives by the example of ransomwareMichael P. Heinl, Alexander Giehl, Lukas Graif. [doi]
- Real-time stream processing tool for detecting suspicious network patterns using machine learningMikolaj Komisarek, Michal Choras, Rafal Kozik, Marek Pawlicki. [doi]
- Adversarial machine learning for spam filtersBhargav Kuchipudi, Ravi Teja Nannapaneni, Qi Liao. [doi]
- Disposable botnets: examining the anatomy of IoT botnet infrastructureRui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Gañán, Michel van Eeten. [doi]
- 3: automated distributed file system storage state reconstructionEdward Harshany, Ryan Benton, David Bourrie, Michael Black, William Bradley Glisson. [doi]
- Post-mortem digital forensic artifacts of TikTok Android AppPatrício Domingues, Ruben Nogueira, José Carlos Francisco, Miguel Frade. [doi]
- A note on blind contact tracing at scale with applications to the COVID-19 pandemicJack K. Fitzsimons, Atul Mantri, Robert Pisarczyk, Tom Rainforth, Zhikuan Zhao. [doi]
- Data visualization in internet of things: tools, methodologies, and challengesAntonis Protopsaltis, Panagiotis G. Sarigiannidis, Dimitrios Margounakis, Anastasios Lytos. [doi]
- Design and performance evaluation of reversible network covert channelsPrzemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione. [doi]
- Locality sensitive hashing for tampering detection in automotive systemsRoland Bolboaca, Teri Lenard, Béla Genge, Piroska Haller. [doi]
- Quantifying autonomous system IP churn using attack traffic of botnetsHarm Griffioen, Christian Doerr. [doi]
- Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessmentArnold Sykosch, Christian Doll, Matthias Wübbeling, Michael Meier 0001. [doi]
- SoK: linking information security metrics to management success factorsRainer Diesch, Helmut Krcmar. [doi]
- MSP: static detection of side channels in MSP430 programsSepideh Pouyanrad, Jan Tobias Mühlberg, Wouter Joosen. [doi]
- HIP: HSM-based identities for plug-and-chargeAndreas Fuchs, Dustin Kern, Christoph Krauß, Maria Zhdanova. [doi]
- TAVeer: an interpretable topic-agnostic authorship verification methodOren Halvani, Lukas Graner, Roey Regev. [doi]
- ASAINT: a spy App identification system based on network trafficMauro Conti, Giulio Rigoni, Flavio Toffalini. [doi]
- Memory corruption attacks within Android TEEs: a case study based on OP-TEEFabian Fleischer, Marcel Busch, Phillip Kuhrt. [doi]
- Concurrent error detection revisited: hardware protection against fault and side-channel attacksJan Richter-Brockmann, Pascal Sasdrich, Florian Bache, Tim Güneysu. [doi]
- Integrating digital twin security simulations in the security operations centerMarietheres Dietz, Manfred Vielberth, Günther Pernul. [doi]
- Balancing trust and privacy in computer-mediated introduction: featuring risk as a determinant for trustworthiness requirements elicitationAngela Borchert, Nicolas E. Díaz Ferreyra, Maritta Heisel. [doi]
- SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigationXiaoyu Du, Chris Hargreaves, John Sheppard, Felix Anda, Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon. [doi]
- Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queriesSean Rivera, Vijay K. Gurbani, Sofiane Lagraa, Antonio Ken Iannillo, Radu State. [doi]
- Towards detection of software supply chain attacks by forensic artifactsMarc Ohm, Arnold Sykosch, Michael Meier 0001. [doi]
- Dynamic risk management architecture based on heterogeneous data sources for enhancing the cyber situational awareness in organizationsXavier Larriva-Novo, Mario Vega Barbas, Víctor A. Villagrá, Diego Rivera, Mario Sanz Rodrigo, Manuel Avarez-Campana. [doi]
- Threat landscape for smart grid systemsChristos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis, Costas Vassilakis, Nicholas Kolokotronis, Vasiliki-Georgia Bilali, Dimitris Kavallieros. [doi]
- Non-blind steganalysisNiklas Bunzel, Martin Steinebach, Huajian Liu. [doi]
- Blockchain-based chain of custody: towards real-time tamper-proof evidence managementLiza Ahmad, Salam Khanji, Farkhund Iqbal, Faouzi Kamoun. [doi]
- SoK: contemporary issues and challenges to enable cyber situational awareness for network securityMartin Husák, Tomás Jirsík, Shanchieh Jay Yang. [doi]
- Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial studyPiotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk. [doi]
- Building a testing environment for SDN networks analysis for electrical grid applicationsToni Cantero-Gubert, Alba Colet, Pol Paradell, J. L. Domínguez-García. [doi]
- Evaluation methodology for mission-centric cyber situational awareness capabilitiesDavid Sandoval Rodriguez-Bermejo, Roumen Daton Medenou, Ramis Pasqual de Riquelme, Jorge Maestre Vidal, Francesco Torelli, Salvador Llopis Sánchez. [doi]
- Improving security in industry 4.0 by extending OPC-UA with usage controlFabio Martinelli, Oleksii Osliak, Paolo Mori, Andrea Saracino. [doi]
- Subverting Linux' integrity measurement architectureFelix Bohling, Tobias Mueller, Michael Eckel, Jens Lindemann. [doi]
- Automated security test generation for MQTT using attack patternsHannes Sochor, Flavio Ferrarotti, Rudolf Ramler. [doi]
- Jit fault detection: increasing availability in 1oo2 systems just-in-timeLeo Botler, Nermin Kajtazovic, Konrad Diwold, Kay Römer. [doi]
- Privacy threats in low-cost people counting devicesNiccolò Maltoni, Antonio Magnani, Luca Calderoni. [doi]
- SoK: why Johnny can't fix PGP standardizationHarry Halpin. [doi]
- 4P based forensics investigation framework for smart connected toysBenjamin Yankson, Farkhund Iqbal, Patrick C. K. Hung. [doi]
- Towards using differentially private synthetic data for machine learning in collaborative data science projectsMichael Holmes, George Theodorakopoulos. [doi]
- To tweet or not to tweet: covertly manipulating a Twitter debate on vaccines using malware-induced misperceptionsFilipo Sharevski, Peter Jachim, Kevin Florek. [doi]
- A silver bullet?: a comparison of accountants and developers mental models in the raise of blockchainRose Esmander, Pascal Lafourcade 0001, Marius Lombard-Platet, Claudia Negri Ribalta. [doi]
- A novel automatic discovery system of critical assets in cyberspace-oriented military missionsÁlvaro Luis Martínez, Víctor A. Villagrá González. [doi]
- k, l)-degree method with location entropy edge selectionJana Medková. [doi]
- Investigation into the security and privacy of iOS VPN applicationsJack Wilson, David McLuskie, Ethan Bayne. [doi]
- Analyzing the real-world applicability of DGA classifiersArthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert. [doi]
- DIDEROT: an intrusion detection and prevention system for DNP3-based SCADA systemsPanagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, George Efstathopoulos, Paris-Alexandros Karypidis, Antonios Sarigiannidis. [doi]
- A framework for automated evaluation of security metricsMatthew Zaber, Suku Nair. [doi]
- Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of thingsOmair Faraj, David Megías, Abdel Mehsen Ahmad, Joaquín García-Alfaro. [doi]
- Distinguishability of adversarial examplesYi Qin, Ryan Hunt, Chuan Yue. [doi]
- CyberWolf: assessing vulnerabilities of ICT-intensive financial marketsAndrea Calesso, Mauro Conti, Martino Grasselli. [doi]
- Covert storage caches using the NTP protocolTobias Schmidbauer, Steffen Wendzel. [doi]
- INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networksJordi Ortiz Murillo, Ramon Sanchez-Iborra, Jorge Bernal Bernabé, Antonio F. Skarmeta, Chafika Benzaid, Tarik Taleb, Pol Alemany, Raul Muñoz, Ricard Vilalta, Chrystel Gaber, Jean-Philippe Wary, Dhouha Ayed, Pascal Bisson, Maria Christopoulou, George Xilouris, Edgardo Montes de Oca, Gürkan Gür, Gianni Santinelli, Vincent Lefebvre, Antonio Pastor, Diego López. [doi]
- Mixed-code text analysis for the detection of online hidden propagandaAndrea Tundis, Gaurav Mukherjee, Max Mühlhäuser. [doi]
- SoK: engineering privacy-aware high-tech systemsGiovanni Maria Riva, Alexandr Vasenev, Nicola Zannone. [doi]
- Exploring data leakage in encrypted payload using supervised machine learningAmir Khaleghi Moghaddam, A. Nur Zincir-Heywood. [doi]
- SOK: cryptocurrency networking context, state-of-the-art, challengesMaya Dotan, Yvonne Anne Pignolet, Stefan Schmid 0001, Saar Tochner, Aviv Zohar. [doi]
- Feasibility study of a camera-based PUF in a realistic scenarioKazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon. [doi]
- Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspectiveAleksandra Pawlicka, Michal Choras, Marek Pawlicki. [doi]
- A comparison of stream mining algorithms on botnet detectionGuilherme Henrique Ribeiro, Elaine Ribeiro de Faria Paiva, Rodrigo Sanches Miani. [doi]
- An overview of limitations and approaches in identity managementDaniela Pöhn, Wolfgang Hommel. [doi]
- Factors affecting the market adoption of cyber-security products in energy and electrical systems: the case of SPEARTheodoros Rokkas, Ioannis Neokosmidis. [doi]
- VisualDroid: automatic triage and detection of Android repackaged applicationsRosangela Casolare, Carlo De Dominicis, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. [doi]
- Security assurance cases for road vehicles: an industry perspectiveMazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato. [doi]
- An empirical study on the impact of GDPR and right to be forgotten - organisations and users perspectiveVincenzo Mangini, Irina Tal, Arghir-Nicolae Moldovan. [doi]
- Clust-IT: clustering-based intrusion detection in IoT environmentsRobert P. Markiewicz, Daniele Sgandurra. [doi]
- Privacy-enhanced robust image hashing with bloom filtersUwe Breidenbach, Martin Steinebach, Huajian Liu. [doi]
- PaperW8: an IoT bricking ransomware proof of conceptCalvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio Hernandez-Castro. [doi]
- AVRS: emulating AVR microcontrollers for reverse engineering and security testingMichael Pucher, Christian Kudera, Georg Merzdovnik. [doi]
- RESCURE: a security solution for IoT life cycleGeorgios N. Selimis, Rui Wang, Roel Maes, Geert Jan Schrijen, Mario Münzer, Stefan Ilic, Frans M. J. Willems, Lieneke Kusters. [doi]
- How do app vendors respond to subject access requests?: a longitudinal privacy study on iOS and Android AppsJacob Leon Kröger, Jens Lindemann, Dominik Herrmann. [doi]
- Distributed packet inspection for network security purposes in software-defined networking environmentsPiotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Marcin Gregorczyk, Maciej Purski, Wojciech Mazurczyk. [doi]
- Contract-based design patterns: a design by contract approach to specify security patternsCaine Silva, Sylvain Guérin, Raúl Mazo, Joël Champeau. [doi]
- Cyber-risk identification for a digital substationAthar Khodabakhsh, Sule Yildirim Yayilgan, Mohamed Abomhara, Maren Istad, Nargis Hurzuk. [doi]
- SysGen: system state corpus generatorBen Lenard, James Wagner, Alexander Rasin, Jonathan Grier. [doi]
- Enhanced performance for the encrypted web through TLS resumption across hostnamesErik Sy, Moritz Moennich, Tobias Mueller, Hannes Federrath, Mathias Fischer 0001. [doi]
- On the importance of cyber-security training for multi-vector energy distribution system operatorsDimitrios Vozikis, Eleni Darra, Tanel Kuusk, Dimitris Kavallieros, Aare Reintam, Xavier Bellekens. [doi]
- A privacy-aware digital forensics investigation in enterprisesLudwig Englbrecht, Günther Pernul. [doi]
- Vector packet encapsulation: the case for a scalable IPsec encryption protocolMichael Pfeiffer 0006, Franz Girlich, Michael Rossberg, Guenter Schaefer. [doi]
- DoH Insight: detecting DNS over HTTPS by machine learningDmitrii Vekshin, Karel Hynek, Tomás Cejka. [doi]
- Detecting double compression and splicing using benfords first digit lawRaphael Antonius Frick, Huajian Liu, Martin Steinebach. [doi]
- Security impacts of sub-optimal DevSecOps implementations in a highly regulated environmentJose Andre Morales, Thomas P. Scanlon, Aaron Volkmann, Joseph Yankel, Hasan Yasar. [doi]
- Advanced metering infrastructures: security risks and mitigationGueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles. [doi]
- DICE harder: a hardware implementation of the device identifier composition engineLukas Jäger, Richard Petri. [doi]
- Template-based Android inter process communication fuzzingAnatoli Kalysch, Mark Deutel, Tilo Müller. [doi]
- Attacker-centric thinking in security: perspectives from financial services practitionersCaroline Moeckel. [doi]
- Relaxation time in complex networkDmytro V. Lande, Andrei Snarskii, Oleh O. Dmytrenko, Igor Subach. [doi]
- A case study on the representativeness of public DoS network traffic data for cybersecurity researchMarta Catillo, Antonio Pecchia, Massimiliano Rak, Umberto Villano. [doi]
- Machine learning for tree structures in fake site detectionTaichi Ishikawa, Yu-Lu Liu, David Lawrence Shepard, Kilho Shin. [doi]
- Towards the performance evaluation of a clustering and trust based security mechanism for VANETAmira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi. [doi]
- Exploiting minification for data hiding purposesPawel Rajba, Wojciech Mazurczyk. [doi]
- Automated modelling of security incidents to represent logging requirements in software systemsFanny Rivera-Ortiz, Liliana Pasquale. [doi]
- MP2ML: a mixed-protocol machine learning framework for private inferenceFabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider 0003, Hossein Yalame. [doi]
- AndroPRINT: analysing the fingerprintability of the Android APIGerald Palfinger, Bernd Prünster. [doi]
- An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel techniqueDaniel Vogel, Ulugbek Akhmedjanov, Marc Ohm, Michael Meier 0001. [doi]
- Confiance: detecting vulnerabilities in Java Card appletsLéopold Ouairy, Hélène Le Bouder, Jean-Louis Lanet. [doi]
- Critical traffic analysis on the tor networkFlorian Platzer, Marcel Schäfer, Martin Steinebach. [doi]
- Formalising fault injection and countermeasuresThomas Given-Wilson, Axel Legay. [doi]
- Making use of NXt to nothing: the effect of class imbalances on DGA detection classifiersArthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert. [doi]
- Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling RansomwareZhen Li, Qi Liao. [doi]
- Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations?Richard E. Overill. [doi]
- SoK: a taxonomy for anomaly detection in wireless sensor networks focused on node-level techniquesDominik Widhalm, Karl M. Göschka, Wolfgang Kastner. [doi]
- Testing the effectiveness of tailored phishing techniques in industry and academia: a field experimentPavlo Burda, Tzouliano Chotza, Luca Allodi, Nicola Zannone. [doi]
- CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operationsRoumen Daton Medenou, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido, Alvaro Luis Martinez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Gerardo Ramis Pasqual De Riquelme, Antonio Berardi, Paolo De Santis, Francesco Torelli, Salvador Llopis Sanchez. [doi]
- Fighting N-day vulnerabilities with automated CVSS vector prediction at disclosureClément Elbaz, Louis Rilling, Christine Morin. [doi]
- Stegomalware detection through structural analysis of media filesDamian Puchalski, Luca Caviglione, Rafal Kozik, Adrian Marzecki, Slawomir Krawczyk, Michal Choras. [doi]
- Post-quantum MACsec key agreement for ethernet networksJoo Yeon Cho, Andrew Sergeev. [doi]
- A semi-supervised approach for network intrusion detectionRadoslava Svihrová, Christian Lettner. [doi]
- Denial of sustainability on military tactical cloudsJorge Maestre Vidal, Marco Antonio Sotelo Monge. [doi]
- Refining the evaluation of the degree of security of a system built using security patternsOlga Villagrán-Velasco, Eduardo B. Fernández, Jorge L. Ortega-Arjona. [doi]
- Negative filtering of CCTV Content - forensic video analysis frameworkFranck Jeveme Panta, André Péninou, Florence Sèdes. [doi]
- IoT dataset generation framework for evaluating anomaly detection mechanismsAndreas Meyer-Berg, Rolf Egert, Leon Böck, Max Mühlhäuser. [doi]
- STALK: security analysis of smartwatches for kidsChristoph Saatjohann, Fabian Ising, Luise Krings, Sebastian Schinzel. [doi]
- A real world study on employees' susceptibility to phishing attacksMarco De Bona, Federica Paci. [doi]
- Detection and classification of slow DoS attacks targeting network serversEnrico Cambiaso, Maurizio Aiello, Maurizio Mongelli, Ivan Vaccari. [doi]
- A device identification method based on LED fingerprint for visible light communication systemDayu Shi, Xun Zhang 0002, Andrei Vladimirescu, Lina Shi, Yanqi Huang, Yourong Liu. [doi]