Abstract is missing.
- Adaptive Mitigation of Tactical Denial of SustainabilityMarco Antonio Sotelo Monge, Jorge Maestre Vidal, Roumen Daton Medenou Choumanof. [doi]
- A web tool for analyzing FIDO2/WebAuthn Requests and ResponsesAthanasios Vasileios Grammatopoulos, Ilias Politis, Christos Xenakis. [doi]
- Secure Open Fronthaul Interface for 5G NetworksJoo Yeon Cho, Andrew Sergeev. [doi]
- Do Security Reports Meet Usability?: Lessons Learned from Using Actionable Mitigations for Patching TLS MisconfigurationsSalvatore Manfredi, Mariano Ceccato, Giada Sciarretta, Silvio Ranise. [doi]
- Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systemsCristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos. [doi]
- Optimizing Packet Scheduling and Path Selection for Anonymous Voice CallsDavid Schatz, Michael Rossberg, Guenter Schaefer. [doi]
- Privacy-Preserving Online Parking Based on Smart ContractsPetr Dzurenda, Carles Angles-Tafalla, Sara Ricci, Lukas Malina. [doi]
- Risks and Opportunities for Information Hiding in DICOM StandardAleksandra Mileva, Luca Caviglione, Aleksandar Velinov, Steffen Wendzel, Vesna Dimitrova. [doi]
- Obstacles and Challenges in Transforming Applications for Distributed Data Ledger IntegrationMartin Pirker, Ernst Piller. [doi]
- A clustering approach to anonymize locations during dataset de-identificationJenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens. [doi]
- Network Flow Entropy for Identifying Malicious Behaviours in DNS TunnelsYulduz Khodjaeva, Nur Zincir-Heywood. [doi]
- Towards Improving Identity and Access Management with the IdMSecMan Process FrameworkDaniela Pöhn, Sebastian Seeber, Tanja Hanauer, Jule Anna Ziegler, David Schmitz. [doi]
- Message-of-the-Day (MOTD) Banner Language Variations as an Adaptive Honeypot Deterrent of Unauthorized AccessFilipo Sharevski, Samuel Jevitz. [doi]
- On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark WebGeorge Pantelis, Petros Petrou, Sophia Karagiorgou, Dimitrios Alexandrou. [doi]
- Secure Decision Forest EvaluationSlim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval. [doi]
- SoK: Remote Power AnalysisMacarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley. [doi]
- Towards Secure Evaluation of Online FunctionalitiesAndreas Klinger, Ulrike Meyer. [doi]
- On the Evaluation of Sequential Machine Learning for Network Intrusion DetectionAndrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese. [doi]
- Location Security under Reference Signals' Spoofing Attacks: Threat Model and BoundsStefania Bartoletti, Giuseppe Bianchi 0001, Danilo Orlando, Ivan Palamà, Nicola Blefari-Melazzi. [doi]
- JPEG File Fragmentation Point Detection using Huffman Code and Quantization Array ValidationVincent van der Meer, Jeroen van den Bos. [doi]
- AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithmPantaleone Nespoli, Félix Gómez Mármol, Georgios Kambourakis. [doi]
- The Matter of Cybersecurity Expert Workforce Scarcity in the Czech Republic and Its Alleviation Through the Proposed Qualifications FrameworkJakub Drmola, Frantisek Kasl, Pavel Loutocký, Miroslav Mares, Tomás Pitner, Jakub Vostoupal. [doi]
- A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy AnalysisSalatiel Ezennaya-Gomez, Stefan Kiltz, Christian Kraetzer, Jana Dittmann. [doi]
- Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved ThroughputSteven Engler, Ian Goldberg. [doi]
- Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small EnterprisesBernd Remmele, Jessica Peichl. [doi]
- A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email DetectionPanagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis. [doi]
- An exploratory analysis on the impact of Shodan scanning tool on the network attacksAndrea Tundis, Eric Marc Modo Nga, Max Mühlhäuser. [doi]
- How Lightning's Routing Diminishes its AnonymitySatwik Prabhu Kumble, Dick H. J. Epema, Stefanie Roos. [doi]
- Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the InternetMax Maaß, Marc-Pascal Clement, Matthias Hollick. [doi]
- DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS ProtectionsUmberto Morelli, Ivan Vaccari, Silvio Ranise, Enrico Cambiaso. [doi]
- Implementing CRYSTALS-Dilithium Signature Scheme on FPGAsSara Ricci, Lukas Malina, Petr Jedlicka, David Smékal, Jan Hajny, Peter Cíbik, Petr Dzurenda, Patrik Dobias. [doi]
- Userspace Software Integrity MeasurementMichael Eckel, Tim Riemann. [doi]
- Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling ApproachJavad Forough, Monowar H. Bhuyan, Erik Elmroth. [doi]
- VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android AppsHiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito. [doi]
- Modeling of Personalized Privacy Disclosure Behavior: A Formal Method ApproachA. K. M. Nuhil Mehdy, Hoda Mehrpouyan. [doi]
- SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android ApplicationsRosangela Casolare, Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. [doi]
- DeCanSec: A Decentralized Architecture for Secure Statistical Computations on Distributed Health Registry DataNarasimha Raghavan Veeraragavan, Jan Franz Nygård. [doi]
- Efficient Error Prediction for Differentially Private AlgorithmsBoel Nelson. [doi]
- Information Security Assessment and Certification within Supply ChainsHenrique Santos, André Oliveira, Lúcia Soares, Alan Satis, Alexandre Santos. [doi]
- From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing PlatformsClemens Sauerwein, Daniel Fischer 0003, Milena Rubsamen, Guido Rosenberger, Dirk Stelzer, Ruth Breu. [doi]
- Classifying SMEs for Approaching Cybersecurity Competence and AwarenessAlireza Shojaifar, Heini Järvinen. [doi]
- Information Security Analysis in the Passenger-Autonomous Vehicle InteractionMariia Bakhtina, Raimundas Matulevicius. [doi]
- What should we pay attention to when classifying violent videos?Marcos Vinícius Adão Teixeira, Sandra Avila. [doi]
- Virtual Knowledge Graphs for Federated Log AnalysisKabul Kurniawan, Andreas Ekelhart, Elmar Kiesling, Dietmar Winkler 0001, Gerald Quirchmayr, A Min Tjoa. [doi]
- I Told You Tomorrow: Practical Time-Locked Secrets using Smart ContractsEnrico Bacis, Dario Facchinetti, Marco Guarnieri, Marco Rosa, Matthew Rossi, Stefano Paraboschi. [doi]
- Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing DetectionBram van Dooremaal, Pavlo Burda, Luca Allodi, Nicola Zannone. [doi]
- V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive SystemsThomas Rosenstatter, Tomas Olovsson, Magnus Almgren. [doi]
- Evaluating the Data Inconsistency of Open-Source Vulnerability RepositoriesYuning Jiang, Manfred A. Jeusfeld, Jianguo Ding. [doi]
- Two Truths and a Lie: Exploring Soft Moderation of COVID-19 Misinformation with Amazon AlexaFilipo Sharevski, Donald Gover. [doi]
- Uniqueness Assessment of Human Mobility on Multi-Sensor DatasetsAntoine Boutet, Sonia Ben Mokhtar. [doi]
- Nori: Concealing the Concealed Identifier in 5GJohn Preuß Mattsson, Prajwol Kumar Nakarmi. [doi]
- Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETsOns Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi. [doi]
- Continuous User Authentication for Human-Robot CollaborationShurook S. Almohamade, John A. Clark, James Law. [doi]
- In-vehicle detection of targeted CAN bus attacksFlorian Fenzl, Roland Rieke, Andreas Dominik. [doi]
- Discovery of Single-Vendor Marketplace Operators in the Tor-NetworkFabian Brenner, Florian Platzer, Martin Steinebach. [doi]
- Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT EnvironmentsAndraz Krasovec, Gianmarco Baldini, Veljko Pejovic. [doi]
- A Real-Time Deep Learning Approach for Real-World Video Anomaly DetectionStefano Petrocchi, Giacomo Giorgi, Mario G. C. A. Cimino. [doi]
- Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and TrainingMaxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu. [doi]
- exHide: Hiding Data within the exFAT File SystemJulian Heeger, York Yannikos, Martin Steinebach. [doi]
- Formal Validation of a Security Mechanism against the RSU Compromise AttackOns Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss, Sihem Guemara El Fatmi. [doi]
- Linking CVE's to MITRE ATT&CK TechniquesAditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac. [doi]
- Self-Determined Reciprocal Recommender Systemwith Strong Privacy GuaranteesSaskia Nuñez von Voigt, Erik Daniel, Florian Tschorsch. [doi]
- Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic ArtifactsTyler Balon, Krikor Herlopian, Ibrahim M. Baggili, Cinthya Grajeda-Mendez. [doi]
- Pan-European Cybersecurity Incidents Information Sharing Platform to support NIS DirectiveDimitrios Skias, Sofia Tsekeridou, Theodore B. Zahariadis, Artemis C. Voulkidis, Terpsichori Helen Velivassaki, Konstantina Fotiadou. [doi]
- Chaotic Pseudo Random Number Generators: A Case Study on Replication Study ChallengesJörg Keller 0001. [doi]
- Fighting organized crime by automatically detecting money laundering-related financial transactionsAndrea Tundis, Soujanya Nemalikanti, Max Mühlhäuser. [doi]
- Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an OverviewTim Bender, Rolf Huesmann, Andreas Heinemann. [doi]
- Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning AlgorithmsMarcos Cavalcanti, Pedro R. M. Inácio, Mário M. Freire. [doi]
- 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack InjectionZujany Salazar, Huu-Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca. [doi]
- Secret Sharing-based Authenticated Key Agreement ProtocolPetr Dzurenda, Sara Ricci, Raúl Casanova Marques, Jan Hajny, Petr Cika. [doi]
- A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNsMahmoud Abdallah, Nhien-An Le-Khac, Hamed Jahromi, Anca Delia Jurcut. [doi]
- Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark - Usefulness, Barriers, and RecommendationsMads Schaarup Andersen. [doi]
- PESTLE Analysis of Cybersecurity EducationSara Ricci, Vladimir Janout, Simon Parker, Jan Jerabek, Jan Hajny, Argyro Chatzopoulou, Remi Badonnel. [doi]
- Analyzing and Securing SOME/IP Automotive Services with Formal and Practical MethodsDaniel Zelle, Timm Lauser, Dustin Kern, Christoph Krauß. [doi]
- A Recommender System for Tracking VulnerabilitiesPhilip Dale Huff, Kylie McClanahan, Thao Le, Qinghua Li. [doi]
- RansomClave: Ransomware Key Management using SGXAlpesh Bhudia, Daniel O'Keeffe, Daniele Sgandurra, Darren Hurley-Smith. [doi]
- A Formal Analysis of EnOcean's Teach-in and AuthenticationKatharina Hofer-Schmitz. [doi]
- A Medium-Interaction Emulation and Monitoring System for Operational TechnologyStefano Bistarelli, Emanuele Bosimini, Francesco Santini 0001. [doi]
- Irish Attitudes Toward COVID Tracker App & Privacy: Sentiment Analysis on Twitter and Survey DataPintu Lohar, Guodong Xie, Malika Bendechache, Rob Brennan, Edoardo Celeste, Ramona Trestian, Irina Tal. [doi]
- A Systematic Analysis of Covert Channels in the Network Time ProtocolJonas Hielscher, Kevin Lamshöft, Christian Krätzer, Jana Dittmann. [doi]
- A Holistic Approach to Enhanced Security and Privacy in Digital Health PassportsTore Frederiksen. [doi]
- Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency LogsArthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer. [doi]
- SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networksCharilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, Qiang Ni, Charalambos Klitis, George Guirgis, Ana R. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, Konstantinos Votis, George Amponis, Wissam Mallouli. [doi]
- Secure exchange of cyber threat intelligence using TAXII and distributed ledger technologies - application for electrical power and energy systemMaryam Pahlevan, Artemis C. Voulkidis, Terpsichori Helen Velivassaki. [doi]
- An Indicators-of-Risk Library for Industrial Network SecurityCarolina Adaros Boye, Paul Kearney, Mark B. Josephs, Hans Ulmer. [doi]
- Towards Interoperable Vaccination Certificate ServicesAndreea Ancuta Corici, Tina Hühnlein, Detlef Hühnlein, Olaf Rode. [doi]
- Grand Theft App: Digital Forensics of Vehicle Assistant AppsSimon Ebbers, Fabian Ising, Christoph Saatjohann, Sebastian Schinzel. [doi]
- SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security LaboratoriesJoachim Fabini, Alexander Hartl, Fares Meghdouri, Claudia Breitenfellner, Tanja Zseby. [doi]
- Detection of Brute-Force Attacks in End-to-End Encrypted Network TrafficPascal Wichmann, Matthias Marx, Hannes Federrath, Mathias Fischer 0001. [doi]
- Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity ChallengesTiago Espinha Gasiba, Iosif Andrei-Cristian, Ulrike Lechner, Maria Pinto-Albuquerque. [doi]
- Unsupervised Ethical Equity Evaluation of Adversarial Federated NetworksIlias Siniosoglou, Vasileios Argyriou, Stamatia Bibi, Thomas Lagkas, Panagiotis Sarigiannidis. [doi]
- First Step Towards EXPLAINable DGA Multiclass ClassificationArthur Drichel, Nils Faerber, Ulrike Meyer. [doi]
- Forensicast: A Non-intrusive Approach & Tool For Logical Forensic Acquisition & Analysis of The Google Chromecast TVAlex Sitterer, Nicholas Dubois, Ibrahim Baggili. [doi]
- Cybersecurity Curricula DesignerJan Hajny, Sara Ricci, Edmundas Piesarskas, Marek Sikora. [doi]
- Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental StudyAnkur Chattopadhyay, Robert Ruska Jr., Levi Pfantz. [doi]
- An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use CaseChristian Wolschke, Stefan Marksteiner, Tobias Braun, Markus Wolf 0003. [doi]
- Nautilus: A Tool For Automated Deployment And Sharing Of Cyber Range ScenariosGiorgio Bernardinetti, Stefano Iafrate, Giuseppe Bianchi. [doi]
- RapidVMI: Fast and multi-core aware active virtual machine introspectionThomas Dangl, Benjamin Taubmann, Hans P. Reiser. [doi]
- Risk-Oriented Design Approach For Forensic-Ready Software SystemsLukas Daubner, Raimundas Matulevicius. [doi]
- Best Practices for Notification Studiesfor Security and Privacy Issues on the InternetMax Maaß, Henning Pridöhl, Dominik Herrmann, Matthias Hollick. [doi]
- Data Hiding Using Code ObfuscationPawel Rajba, Wojciech Mazurczyk. [doi]
- Madrid Quantum Network: A First Step to Quantum InternetMarta Irene García Cid, Laura Ortiz Martín, Vicente Martín Ayuso. [doi]
- Building Open Source Cyber Range To Teach Cyber SecurityTomás Lieskovan, Jan Hajny. [doi]
- Control Effectiveness: a Capture-the-Flag StudyArnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese. [doi]
- A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME NeedsMax van Haastrecht, Injy Sarhan, Alireza Shojaifar, Louis Baumgartner, Wissam Mallouli, Marco Spruit. [doi]
- MI-LXC: A Small-Scale Internet-Like Environment for Network Security TeachingFrançois Lesueur, Camille Noûs. [doi]
- Bloom Filter based Collective Remote Attestation for Dynamic NetworksSalvatore Frontera, Riccardo Lazzeretti. [doi]
- Integrating Security Behavior into Attack SimulationsSimon Hacks, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou, Ariadni Michalitsi-Psarrou. [doi]
- Remote Attestation Extended to the Analog DomainLukas Jäger, Dominik Lorych. [doi]
- Privacy in Times of COVID-19: A Pilot Study in the Republic of IrelandGuodong Xie, Pintu Lohar, Claudia Florea, Malika Bendechache, Ramona Trestian, Rob Brennan, Regina Connolly, Irina Tal. [doi]
- A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication ProtocolQi Liu, Hubert B. Keller, Veit Hagenmeyer. [doi]
- The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendationsKitty Kioskli, Theo Fotis, Haralambos Mouratidis. [doi]
- bccstego: A Framework for Investigating Network Covert ChannelsMatteo Repetto, Luca Caviglione, Marco Zuppelli. [doi]
- Towards a standardized model for privacy-preserving Verifiable CredentialsJesús García Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio F. Skarmeta. [doi]
- The Stress as Adversarial Factor for Cyber Decision MakingDavid Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Juan Estévez Tapiador. [doi]
- Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystemsCristina Timón López, Ignacio Alamillo Alamillo Domingo, Julián Valero Valero Torrijos. [doi]
- Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural ApplicationsFranz Kuntke, Marcel Sinn, Christian Reuter 0001. [doi]
- Listen to Your Heart: Evaluation of the Cardiologic EcosystemEndres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel. [doi]
- Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL projectMikolaj Komisarek, Marek Pawlicki, Mikolaj Kowalski, Adrian Marzecki, Rafal Kozik, Michal Choras. [doi]
- Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert ChannelsTobias Schmidbauer, Steffen Wendzel. [doi]
- Understanding the Ethical and Regulatory boundaries of the Military Actuation on the CyberspacePedro Ramon Y. Cajal Ramo, Jorge Maestre Vidal. [doi]
- FADE: Detecting Fake News Articles on the WebBahruz Jabiyev, Sinan Pehlivanoglu, Kaan Onarlioglu, Engin Kirda. [doi]
- pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert ChannelsMarco Zuppelli, Luca Caviglione. [doi]
- Strong Anonymity is not Enough: Introducing Fault Tolerance to Planet-Scale Anonymous Communication SystemsLennart Oldenburg, Florian Tschorsch. [doi]
- User action representation and automated reasoning for the forensic analysis of mobile devicesCosimo Anglano, Massimo Canonico, Laura Giordano, Marco Guazzone, Daniele Theseider Dupre. [doi]
- A Threat Model Analysis of a Mobile Agent-based system on Raspberry PiIván García Aguilar, Antonio Muñoz Gallego. [doi]
- SoK: Money Laundering in CryptocurrenciesKartick Kolachala, Ecem Simsek, Mohammed Ababneh, Roopa Vishwanathan. [doi]
- Managing Anonymous Keys in a Fog-Computing PlatformRaphael Schermann, Ronald Toegl. [doi]
- Solving the cold start problem in Trust Management in IoTMichail Bampatsikos, Ilias Politis, Christos Xenakis, Stelios C. A. Thomopoulos. [doi]
- How Private is Android's Private DNS Setting? Identifying Apps by Encrypted DNS TrafficMichael Mühlhauser, Henning Pridöhl, Dominik Herrmann. [doi]
- POSNoise: An Effective Countermeasure Against Topic Biases in Authorship AnalysisOren Halvani, Lukas Graner. [doi]
- Crème de la Crème: Lessons from Papers in Security PublicationsSimon Vrhovec, Luca Caviglione, Steffen Wendzel. [doi]
- A Revised Taxonomy of Steganography Embedding PatternsSteffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller 0001, Tom Neubert. [doi]
- Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic AttacksTom Neubert, Claus Vielhauer, Christian Kraetzer. [doi]
- Multi-View Learning for Repackaged Malware DetectionShirish Kumar Singh, Kushagra Chaturvedy, Bharavi Mishra. [doi]
- Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeitingMonica Arenas, Hüseyin Demirci, Gabriele Lenzini. [doi]
- SoK: Automatic Deobfuscation of Virtualization-protected ApplicationsPatrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, Edgar R. Weippl. [doi]
- Template Protected Authentication based on Location History and b-Bit MinHashMasakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura, Rie Shigetomi Yamaguchi. [doi]
- System for Continuous Collection of Contextual Information for Network Security Management and Incident HandlingMartin Husák, Martin Lastovicka, Daniel Tovarnák. [doi]
- PUF-based Smart Tags for Supply Chain ManagementAlberto Falcone, Carmelo Felicetti, Alfredo Garro, Antonino Rullo, Domenico Saccà. [doi]
- Ontology-based Cyber Risk Monitoring Using Cyber Threat IntelligenceYazid Merah, Tayeb Kenaza. [doi]
- GEIGER: Solution for small businesses to protect themselves against cyber-threatsJosé Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht. [doi]
- ABEBox: A data driven access control for securing public cloud storage with efficient key revocationEmanuele Raso, Lorenzo Bracciale, Pierpaolo Loreti, Giuseppe Bianchi 0001. [doi]
- Enabling Privacy-Preserving Rule Mining in Decentralized Social NetworksAidmar Wainakh, Aleksej Strassheim, Tim Grube, Jörg Daubert, Max Mühlhäuser. [doi]
- DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learningDavid Megías, Minoru Kuribayashi, Andrea Rosales, Wojciech Mazurczyk. [doi]
- Single-Use Delegatable Signatures Based on Smart ContractsStephan Krenn, Thomas Lorünser. [doi]
- Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in IndonesiaMuhammad Ali Fauzi, Prosper Kandabongee Yeng, Bian Yang, Dita Rachmayani. [doi]
- MESH: A Memory-Efficient Safe Heap for C/C++Emanuel Q. Vintila, Philipp Zieris, Julian Horsch. [doi]
- A Machine Learning Driven Threat Intelligence System for Malicious URL DetectionRupa Chiramdasu, Gautam Srivastava, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu. [doi]
- Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG)Cassius Puodzius, Olivier Zendra, Annelie Heuser, Lamine Noureddine. [doi]
- Study of the Error Detection and Correction Scheme for Distributed Network Covert ChannelsPiotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk. [doi]
- Practitioners' Views on Cybersecurity Control Adoption and EffectivenessLouise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese. [doi]
- TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant and Mutually Authenticated TLS for IoT EnvironmentsSebastian Paul, Felix Schick, Jan Seedorf. [doi]
- Integer Overflow Detection with Delayed Runtime TestZhen Huang, Xiaowei Yu. [doi]
- A Serious Game Design Framework for Software Developers to Put GDPR into PracticeAbdulrahman Alhazmi, Nalin A. G. Arachchilage. [doi]
- Time for Truth: Forensic Analysis of NTFS TimestampsMichael Galhuber, Robert Luh. [doi]
- Log Abstraction for Information Security: Heuristics and ReproducibilityRafael Copstein, Jeff Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood. [doi]
- OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability DatabasesPhilipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter 0001. [doi]
- Subverting Counter Mode Encryption for Hidden Communication in High-Security InfrastructuresAlexander Hartl, Joachim Fabini, Christoph Roschger, Peter Eder-Neuhauser, Marco Petrovic, Roman Tobler, Tanja Zseby. [doi]
- Adversarial Examples Against a BERT ABSA Model - Fooling Bert With L33T, Misspellign, and Punctuation, Nora Hofer, Pascal Schöttle, Alexander Rietzler, Sebastian Stabinger. [doi]