Abstract is missing.
- Rumor and clickbait detection by combining information divergence measures and deep learning techniquesChristian Oliva, Ignacio Palacio Marín, Luis Fernando Lago-Fernández, David Arroyo. [doi]
- Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location TracingAlessandro Brighente, Mauro Conti, Savio Sciancalepore. [doi]
- Using Telegram as a carrier for image steganography: Analysing Telegrams API limitsNiklas Bunzel, Tobias Chen, Martin Steinebach. [doi]
- Limitations of Web Cryptojacking Detection: A Practical EvaluationPawel Rajba, Wojciech Mazurczyk. [doi]
- Data Acquisition on a Large Darknet MarketplaceYork Yannikos, Julian Heeger, Martin Steinebach. [doi]
- HybridDAD: Detecting DDoS Flooding Attack using Machine Learning with Programmable SwitchesMostafa Roshani, Mehdi Nobakht. [doi]
- SMODIC: A Model Checker for Self-modifying CodeTayssir Touili, Xin Ye 0007. [doi]
- Secure Mobile Agents on Embedded Boards: a TPM based solutionAntonio Muñoz. [doi]
- RIPEMB: A framework for assessing hardware-assisted software security schemes in embedded systemsStefan Tauner. [doi]
- Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offsMarwa Gadala, Lorenzo Strigini, Radek Fujdiak. [doi]
- SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted DisplaysReyhan Düzgün, Naheem Noah, Peter Mayer, Sanchari Das, Melanie Volkamer. [doi]
- Revealing MageCart-like Threats in Favicons via Artificial IntelligenceMassimo Guarascio, Marco Zuppelli, Nunziato Cassavia, Luca Caviglione, Giuseppe Manco 0001. [doi]
- On the feasibility of detecting injections in malicious npm packagesSimone Scalco, Ranindya Paramitha, Duc Ly Vu, Fabio Massacci. [doi]
- Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture ConversionGeorgios Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras. [doi]
- Towards Verifiable Differentially-Private PollingGonzalo Munilla Garrido, Johannes Sedlmeir, Matthias Babel. [doi]
- Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation MethodKatsuyuki Umezawa, Hiroki Koyanagi, Sven Wohlgemuth, Yusuke Mishina, Kazuo Takaragi. [doi]
- Applying a cryptographic metric to post-quantum lattice-based signature algorithmsMarkus Rautell, Outi-Marja Latvala, Visa Antero Vallivaara, Kimmo Halunen. [doi]
- Model-Based Incident Response PlaybooksAvi Shaked, Yulia Cherdantseva, Pete Burnap. [doi]
- ConSenseIoT: A Consensus Algorithm for Secure and Scalable Blockchain in the IoT contextHarris Niavis, Konstantinos Loupos. [doi]
- SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and ResponseMartin Husák, Milan Cermák. [doi]
- Parametrization of Probabilistic Risk ModelsSandra König, Abdelkader Magdy Shaaban. [doi]
- The Platform for Czech National Qualifications Framework in CybersecurityJakub Vostoupal, Frantisek Kasl, Pavel Loutocký, Tomás Pitner, Patrik Valo, Adam Valalský, Damián Paranic. [doi]
- FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless NetworksEmilie Bout, Alessandro Brighente, Mauro Conti, Valeria Loscrì. [doi]
- Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial AttacksMohamed Amine Merzouk, Joséphine Delas, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich. [doi]
- Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification ModelEvangelos Chaskos, Jason Diakoumakos, Nicholas Kolokotronis, George Lepouras. [doi]
- Fast and Blind Detection of Rate-Distortion-Preserving Video WatermarksHannes Mareen, Glenn Van Wallendael, Peter Lambert, Fouad Khelifi. [doi]
- A Quantitative Analysis of Offensive Cyber Operation (OCO) Automation ToolsSamuel Zurowski, George Lord, Ibrahim M. Baggili. [doi]
- CloudFL: A Zero-Touch Federated Learning Framework for Privacy-aware Sensor CloudViraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Afra Mashhadi. [doi]
- Improving Security and Scalability in Smart Grids using Blockchain TechnologiesMandana Falahi, Andrei Vasilateanu, Nicolae Goga, George Suciu, Mari-Anais Sachian, Robert Florescu, Stefan-Daniel Stanciu. [doi]
- Trusted and Secure Self-Sovereign Identity frameworkVaios Bolgouras, Anna Angelogianni, Ilias Politis, Christos Xenakis. [doi]
- Reviewing review platforms: a privacy perspectiveKevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens. [doi]
- A Revisit of Attestable Nodes for Networked ApplicationsMathias Schüpany, Martin Pirker. [doi]
- Assessing discrepancies between network traffic and privacy policies of public sector web servicesTimi Heino, Robin Carlsson, Sampsa Rauti, Ville Leppänen. [doi]
- STRIPED: A Threat Analysis Method for IoT SystemsKamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra, Julian Koch, Thorsten Schüppstuhl, Riccardo Scandariato. [doi]
- Securing Communication and Identifying Threats in RTUs: A Vulnerability AnalysisEngla Rencelj Ling, Jose Eduardo Urrea Cabus, Ismail Butun, Robert Lagerström, Johannes Olegård. [doi]
- Explainability-based Debugging of Machine Learning for Vulnerability DiscoveryAngelo Sotgiu, Maura Pintor, Battista Biggio. [doi]
- Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networksArash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Heng Siong Lim, Qiang Ni, Antonios Gouglidis, Wissam Mallouli. [doi]
- Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation AwarenessTahir Ahmad, Umberto Morelli, Silvio Ranise. [doi]
- Towards Image Hashing Robust Against Cropping and RotationMartin Steinebach, Tiberius Berwanger, Huajian Liu. [doi]
- VMIFresh: Efficient and Fresh Caches for Virtual Machine IntrospectionThomas Dangl, Stewart Sentanoe, Hans P. Reiser. [doi]
- Adding European Cybersecurity Skills Framework into Curricula DesignerJan Hajny, Marek Sikora, Athanasios Vasileios Grammatopoulos, Fabio Di Franco. [doi]
- MalRec: A Blockchain-based Malware Recovery Framework for Internet of ThingsAhmed Lekssays, Giorgia Sirigu, Barbara Carminati, Elena Ferrari. [doi]
- Implementation of Revocable Keyed-Verification Anonymous Credentials on Java CardRaúl Casanova Marqués, Petr Dzurenda, Jan Hajny. [doi]
- Introducing Quantum Computing in Mobile Malware DetectionGiovanni Ciaramella, Giacomo Iadarola, Francesco Mercaldo, Marco Storto, Antonella Santone, Fabio Martinelli. [doi]
- Automatic online quantification and prioritization of data protection risksSascha Sven Zmiewski, Jan Laufer, Zoltán Ádám Mann. [doi]
- Botnet Detection in the Internet of Things through All-in-one Deep AutoencodingMarta Catillo, Antonio Pecchia, Umberto Villano. [doi]
- Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat IntelligenceDavy Preuveneers, Wouter Joosen. [doi]
- SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy TechniquesSimin Ghesmati, Walid Fdhila, Edgar R. Weippl. [doi]
- We cannot trust in you: a study about the dissonance among anti-malware enginesDavide Cocca, Antonio Pirozzi, Corrado Aaron Visaggio. [doi]
- Analyzing RRC Replay Attack and Securing Base Station with Practical MethodSeongmin Park, Ilsun You, Hoonyong Park, Dowon Kim. [doi]
- Symbolic analysis meets federated learning to enhance malware identifierCharles-Henry Bertrand Van Ouytsel, Khanh-Huu-The Dam, Axel Legay. [doi]
- Detecting Unknown DGAs without Context InformationArthur Drichel, Justus von Brandt, Ulrike Meyer. [doi]
- Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud ComputingSaurabh Deochake, Vrushali Channapattan. [doi]
- YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPCStefan More, Lukas Alber. [doi]
- Reactive Jamming Detection for LoRaWAN Based on Meta-Data DifferencingHenri Ruotsalainen. [doi]
- TaxIdMA: Towards a Taxonomy for Attacks related to IdentitiesDaniela Pöhn, Wolfgang Hommel. [doi]
- Classifying the factors affecting the adoption of the SDN-microSENSE innovationsTheodoros Rokkas, Ioannis Neokosmidis. [doi]
- Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and CampaignsVincent Drury, Luisa Lux, Ulrike Meyer. [doi]
- Limiting the Size of a Predictive Blacklist While Maintaining Sufficient AccuracySamuel Sulan, Martin Husák. [doi]
- Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' PerspectiveSalatiel Ezennaya-Gomez, Edgar Blumenthal, Marten Eckardt, Justus Krebs, Christopher Kuo, Julius Porbeck, Emirkan Toplu, Stefan Kiltz, Jana Dittmann. [doi]
- Challenging Channels: Encrypted Covert Channels within Challenge-Response AuthenticationTobias Schmidbauer, Jörg Keller 0001, Steffen Wendzel. [doi]
- Security of Smart Grid Networks in the Cyber RangesTomás Lieskovan, Jan Hajny. [doi]
- BISCUIT - Blockchain Security Incident Reporting based on Human ObservationsBenedikt Putz, Manfred Vielberth, Günther Pernul. [doi]
- Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless ComputingAngeliki Aktypi, Dimitris Karnikis, Nikos Vasilakis, Kasper Rasmussen. [doi]
- Cookie Disclaimers: Impact of Design and Users' AttitudeBenjamin Maximilian Berens, Heike Dietmann, Chiara Krisam, Oksana Kulyk, Melanie Volkamer. [doi]
- Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping PlatformsBethany Sumner, Gokila Dorai, John Heslen. [doi]
- Improved Integer-wise Homomorphic Comparison and Division based on Polynomial EvaluationKoki Morimura, Daisuke Maeda, Takashi Nishide. [doi]
- Multi-label Classification of Cybersecurity Text with Distant SupervisionMasahiro Ishii 0002, Kento Mori, Ryoichi Kuwana, Satoshi Matsuura. [doi]
- Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based CredentialsPetr Dzurenda, Raúl Casanova Marqués, Lukas Malina. [doi]
- Register Automata for Malware SpecificationTayssir Touili. [doi]
- ZEKRO: Zero-Knowledge Proof of Integrity ConformanceHeini Bergsson Debes, Thanassis Giannetsos. [doi]
- Web Bot Detection Evasion Using Deep Reinforcement LearningChristos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilios Katos, Stefanos Vrochidis, Ioannis Kompatsiaris. [doi]
- Sim2Testbed Transfer: NDN Performance EvaluationEnkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Ahmed Taffal. [doi]
- UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital mediaVaila Leask, Rémi Cogranne, Dirk Borghys, Helena Bruyninckx. [doi]
- Current Challenges of Cyber Threat and Vulnerability Identification Using Public EnumerationsLukás Sadlek, Pavel Celeda, Daniel Tovarnák. [doi]
- SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity SchemesAmir Sharif, Matteo Ranzi, Roberto Carbone, Giada Sciarretta, Silvio Ranise. [doi]
- Applying Machine Learning on RSRP-based Features for False Base Station DetectionPrajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah. [doi]
- Substation-Aware. An intrusion detection system for the IEC 61850 protocolJose Antonio Lopez, Iñaki Angulo, Saturnino Martinez. [doi]
- SASP: a Semantic web-based Approach for management of Sharable cybersecurity PlaybooksMehdi Akbari Gurabi, Avikarsha Mandal, Jan Popanda, Robert Rapp, Stefan Decker. [doi]
- VALKYRIES: Harmonization and Pre-Standardization of Technology, Training and Tactical Coordinated Operations for First Responders on EU MCIYantsislav Yanakiev, Marta Irene García Cid, Jorge Maestre Vidal, Nikolai Stoianov, Marco Antonio Sotelo Monge. [doi]
- Web Cryptography API: Prevalence and Possible Developer MistakesPascal Wichmann, Maximilian Blochberger, Hannes Federrath. [doi]
- Properties for Cybersecurity Awareness Posters' Design and Quality AssessmentSunil Chaudhary, Marko Kompara, Sebastian Pape 0001, Vasileios Gkioulos. [doi]
- Bridging the Gap Between Certification and Software DevelopmentClaudio A. Ardagna, Nicola Bena, Ramon Martín de Pozuelo. [doi]
- SOAR4IoT: Securing IoT Assets with Digital TwinsPhilip Empl, Daniel Schlette, Daniel Zupfer, Günther Pernul. [doi]
- Multi-Account Dashboard for Authentication Dependency AnalysisDaniela Pöhn, Nils Gruschka, Leonhard Ziegler. [doi]
- Deep Reinforcement Learning-Based Defense Strategy SelectionAxel Charpentier, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich. [doi]
- Evaluating The Cyber-Security Culture of the EPES Sector: Applying a Cyber-Security Culture Framework to assess the EPES Sector's resilience and readinessAnna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis. [doi]
- A Quantitative Assessment of the Detection Performance of Web Vulnerability ScannersEmma Lavens, Pieter Philippaerts, Wouter Joosen. [doi]
- Analysis and Evaluation of Hardware Trust Anchors in the Automotive DomainChristian Plappert, Andreas Fuchs 0002, Ronald Heddergott. [doi]
- Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL ToolkitLuca Caviglione, Martin Grabowski, Kai Gutberlet, Adrian Marzecki, Marco Zuppelli, Andreas Schaffhauser, Wojciech Mazurczyk. [doi]
- Combining Variational Autoencoders and Transformer Language Models for Improved Password GenerationDavid Biesner, Kostadin Cvejoski, Rafet Sifa. [doi]
- SoK: Combating threats in the digital supply chainArne Roar Nygård, Sokratis K. Katsikas. [doi]
- On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software PackagesMarc Ohm, Felix Boes, Christian Bungartz, Michael Meier 0001. [doi]
- Towards a Security Benchmark for the Architectural Design of Microservice ApplicationsAnusha Bambhore Tukaram, Simon Schneider, Nicolás E. Díaz Ferreyra, Georg Simhandl, Uwe Zdun, Riccardo Scandariato. [doi]
- SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery ToolsEmmanouil Samanis, Joseph Gardiner, Awais Rashid. [doi]
- MITRE ATT&CK-driven Cyber Risk AssessmentMohamed Ahmed, Sakshyam Panda, Christos Xenakis, Emmanouil Panaousis. [doi]
- Scenarios for Process-Aware Insider Attack Detection in ManufacturingMartin Macák, Radek Vaclavek, Dasa Kusniráková, Raimundas Matulevicius, Barbora Buhnova. [doi]
- Distance-based Techniques for Personal Microbiome Identification✱Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart. [doi]
- Job Adverts Analyzer for Cybersecurity Skills Needs EvaluationSara Ricci, Marek Sikora, Simon Parker, Imre Lendak, Yianna Danidou, Argyro Chatzopoulou, Remi Badonnel, Donatas Alksnys. [doi]
- MetaSEnD: A Security Enabled Development Life Cycle Meta-ModelDaniele Granata, Massimiliano Rak, Giovanni Salzillo. [doi]
- An Early Detection of Android Malware Using System Calls based Machine Learning ModelXinrun Zhang, Akshay Mathur, Lei Zhao, Safia Rahmat, Quamar Niyaz, Ahmad Y. Javaid, Xiaoli Yang. [doi]
- Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion DetectionMarek Pawlicki, Rafal Kozik, Michal Choras. [doi]
- Forensic analysis of Tor in Windows environment: A case studyVaia-Maria Angeli, Ahmad Atamli, Erisa Karafili. [doi]
- Security Risk Management in Shared Mobility IntegrationAbasi-Amefon Obot Affia, Raimundas Matulevicius. [doi]
- A novel, refined dataset for real-time Network Intrusion DetectionMikolaj Komisarek, Marek Pawlicki, Maria-Elena Mihailescu, Darius Mihai, Mihai Carabas, Rafal Kozik, Michal Choras. [doi]
- The AssureMOSS security certification schemeÁkos Milánkovich, Gergely Eberhardt, Dávid Lukács. [doi]
- Secure Services for Standard RISC-V ArchitecturesDavide Bove. [doi]
- CopypastaVulGuard - A browser extension to prevent copy and paste spreading of vulnerable source code in forum postsHolger Schmidt 0001, Max van Aerssen, Christian Leich, Abdulkader Benni, Salar Al Ali, Jakob Tanz. [doi]
- Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control SystemsTom Neubert, Antonio José Caballero Morcillo, Claus Vielhauer. [doi]
- An Investigation of PSA CertifiedSeongHan Shin, Tomoyuki Ogawa, Ryo Fujita, Mari Itoh, Hirotaka Yoshida. [doi]
- Precise Analysis of Purpose Limitation in Data Flow DiagramsHanaa Alshareef, Katja Tuma, Sandro Stucki, Gerardo Schneider, Riccardo Scandariato. [doi]
- Requirements for an Information Privacy Pedagogy based on the Constructivism Learning TheoryThanos Papaioannou, Aggeliki Tsohou, Maria Karyda 0001, Stylianos Karagiannis. [doi]
- The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End ServiceChrystel Gaber, Ghada Arfaoui, Yannick Carlinet, Nancy Perrot, Laurent Valleyre, Marc Lacoste, Jean-Philippe Wary, Yacine Anser, Rafal Artych, Aleksandra Podlasek, Edgardo Montes de Oca, Vinh Hoa La, Vincent Lefebvre, Gürkan Gür. [doi]
- Modelling privacy harms of compromised personal medical data - beyond data breachSamuel Wairimu, Lothar Fritsch. [doi]
- A Resilient Network Node for the Industrial Internet of ThingsLukas Jäger, Dominik Lorych, Michael Eckel. [doi]
- WSL2 Forensics: Detection, Analysis & RevirtualizationPhilipp Boigner, Robert Luh. [doi]
- A Critique of EU Digital COVID-19 Certificates: Do Vaccine Passports Endanger Privacy?Harry Halpin. [doi]
- Improving Network, Data and Application Security for SMEsChristos Tselios, Ilias Politis, Christos Xenakis. [doi]
- SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best PracticesPriyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl. [doi]
- On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum CryptographyPetr Jedlicka, Lukas Malina, Tomas Gerlich, Zdenek Martinasek, Jan Hajny, Petr Socha. [doi]
- DevSecOps In Embedded Systems: An Empirical Study Of Past LiteratureHasan Yasar, Sam E. Teplov. [doi]
- SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANETMohammed A. Abdelmaguid, Hossam S. Hassanein, Mohammad Zulkernine. [doi]
- Network Steganography Through Redundancy in Higher-Radix Floating-Point RepresentationsCarina Heßeling, Jörg Keller 0001, Sebastian Litzinger. [doi]
- Learning State Machines to Monitor and Detect Anomalies on a Kubernetes ClusterClinton Cao, Agathe Blaise, Sicco Verwer, Filippo Rebecchi. [doi]
- Analysis and prediction of web proxies misbehaviorZahra Nezhadian, Enrico Branca, Natalia Stakhanova. [doi]
- Cyber-Security Culture Assessment in Academia: A COVID-19 Study: Applying a Cyber-Security Culture Framework to assess the Academia's resilience and readinessAnna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis. [doi]
- A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at ScaleJoseph Khoury, Morteza Safaei Pour, Elias Bou-Harb. [doi]
- Security Maturity Self-Assessment Framework for Software Development LifecycleRaluca Brasoveanu, Yusuf Karabulut, Ivan Pashchenko. [doi]
- Shedding Light on the Targeted Victim Profiles of Malicious DownloadersFrançois Labrèche, Enrico Mariconti, Gianluca Stringhini. [doi]
- Federated learning based IDS approach for the IoVAmal Hbaieb, Samiha Ayed, Lamia Chaari. [doi]
- The cybersecurity-related ethical issues of cloud technology and how to avoid themAleksandra Pawlicka, Marek Pawlicki, Rafal Renk, Rafal Kozik, Michal Choras. [doi]
- Lightweight Parsing and Slicing for Bug Identification in CLuca Mecenero, Ranindya Paramitha, Ivan Pashchenko, Fabio Massacci. [doi]
- Android Permission Manager, Visual Cues, and their Effect on Privacy Awareness and Privacy LiteracyVera Schmitt, Maija Poikela, Sebastian Möller 0001. [doi]
- A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy SystemsKonstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis. [doi]
- Towards Efficient FHE Based cPIR Schemes and Their Parameter SelectionCavidan Yakupoglu, Kurt Rohloff. [doi]
- Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things ApplicationsKarol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk. [doi]
- Compiler-Aided Development of Trusted Enclaves with RustFelix Dreissig, Jonas Röckl, Tilo Müller. [doi]
- Cyber-security measures for protecting EPES systems in the 5G areaAlexios Lekidis. [doi]
- An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive DevicesTakahiro Ueda, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto. [doi]
- A Methodology for enhancing Emergency Situational Awareness through Social MediaAntonios Karteris, Georgios Tzanos, Lazaros Papadopoulos, Konstantinos Demestichas, Dimitrios Soudris, Juliette Pauline Philibert, Carlos López Gómez. [doi]
- Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the LiteratureSanaz Adel Alipour, Rita Orji, Nur Zincir-Heywood. [doi]
- A Synopsis of Critical Aspects for Darknet ResearchFlorian Platzer, Alexandra Lux. [doi]
- Disruptive Quantum Safe TechnologiesMarta Irene García Cid, Jorge Álvaro González, Laura Ortiz Martín, Diego Del Río Gómez. [doi]
- Design Space Exploration of DICEDominik Lorych, Lukas Jäger. [doi]
- Fault-Tolerant SDN Solution for Cybersecurity ApplicationsAthanasios Liatifis, Christos Dalamagkas, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Evangelos Markakis, Valeri Mladenov, Panagiotis G. Sarigiannidis. [doi]
- Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104László Erdodi, Pallavi Kaliyar, Siv Hilde Houmb, Aida Akbarzadeh, Andre Jung Waltoft-Olsen. [doi]
- All that is Solid Melts into Air: Towards Decentralized Cryptographic Access ControlHarry Halpin. [doi]
- Risk Assessments Considering Safety, Security, and Their Interdependencies in OT EnvironmentsSiegfried Hollerer, Thilo Sauter, Wolfgang Kastner. [doi]
- GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investmentsIoannis Kalderemidis, Aristeidis Farao, Panagiotis Bountakas, Sakshyam Panda, Christos Xenakis. [doi]
- Secret sharing a key in a distributed way, Lagrange vs NewtonAnastassios Voudouris, Ilias Politis, Christos Xenakis. [doi]
- FileUploadChecker: Detecting and Sanitizing Malicious File Uploads in Web Applications at the Request LevelPascal Wichmann, Alexander Groddeck, Hannes Federrath. [doi]
- Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISSSoundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert. [doi]
- Revisiting a Privacy-Preserving Location-based Service Protocol using Edge ComputingSantosh Kumar Upadhyaya, Srinivas Vivek 0001. [doi]
- Web Page Harvesting for Automatized Large-scale Digital Images Anomaly DetectionMarcin Kowalczyk, Agnieszka Malanowska, Wojciech Mazurczyk, Krzysztof Cabaj. [doi]
- Fraudulent Activities in the Cyber Realm: DEFRAUDify Project: Fraudulent Activities in the Cyber Realm: DEFRAUDify ProjectRazvan-Alexandru Bratulescu, Robert-Ionut Vatasoiu, Sorina-Andreea Mitroi, George Suciu, Mari-Anais Sachian, Daniel-Marian Dutu, Serban-Emanuel Calescu. [doi]
- Analyzing Coverages of Cyber Insurance Policies Using OntologyMarkos Charalambous, Aristeidis Farao, George Kalatzantonakis, Panagiotis Kanakakis, Nikos Salamanos, Evangelos Kotsifakos, Evangellos Froudakis. [doi]
- Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancementsDimitrios Skias, Sofia Tsekeridou, Theodore B. Zahariadis, Artemis C. Voulkidis, Terpsichori Helen Velivassaki. [doi]
- Enhanced Anomaly Detection for Cyber-Attack Detection in Smart Water Distribution SystemsBranka Stojanovic, Helmut Neuschmied, Martin Winter, Ulrike Kleb. [doi]