Abstract is missing.
- Dynamic Intrusion Detection Framework for UAVCAN Protocol Using AIFadhila Tlili, Samiha Ayed, Lamia Chaari Fourati. [doi]
- A Study of Different Awareness Campaigns in a CompanyLaura Gamisch, Daniela Pöhn. [doi]
- The Age of fighting machines: the use of cyber deception for Adversarial Artificial Intelligence in Cyber DefenceDavid Lopes Antunes, Salvador Llopis Sánchez. [doi]
- Identification and Evaluation of Cyber-Physical Threats on Interdependent Critical InfrastructuresSandra König, Abdelkader Magdy Shaaban, Tamara Hadjina, Klemen Gregorc, Albert Kutej. [doi]
- Interactive Environment for Effective Cybersecurity Teaching and LearningWilli Lazarov, Tomas Stodulka, Tiina Schafeitel-Tähtinen, Marko Helenius, Zdenek Martinasek. [doi]
- Experiences with Secure Pipelines in Highly Regulated EnvironmentsJose Andre Morales, Hasan Yasar. [doi]
- Proof-of-work based new encoding scheme for information hiding purposesPawel Rajba, Joerg Keller 0001, Wojciech Mazurczyk. [doi]
- Mitigating undesired interactions between liveness detection components in biometric authenticationEmma Lavens, Davy Preuveneers, Wouter Joosen. [doi]
- Malware Finances and Operations: a Data-Driven Study of the Value Chain for Infections and Compromised AccessJuha Nurmi, Mikko S. Niemelä, Billy Bob Brumley. [doi]
- k-Anonymity on Metagenomic Features in Microbiome DatabasesRudolf Mayer, Alicja Karlowicz, Markus Hittmeir. [doi]
- Evaluation of Real-World Risk-Based Authentication at Online Services Revisited: Complexity WinsJan-Phillip Makowski, Daniela Pöhn. [doi]
- A Comprehensive Study on Third-Party User Tracking in Mobile ApplicationsFederica Paci, Jacopo Pizzoli, Nicola Zannone. [doi]
- Towards Obfuscation of Programmable Logic ControllersVittoria Cozza, Mila Dalla Preda, Marco Lucchese, Massimo Merro, Nicola Zannone. [doi]
- Parameterizing poisoning attacks in federated learning-based intrusion detectionMohamed Amine Merzouk, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich. [doi]
- Reconstructing Timelines: From NTFS Timestamps to File HistoriesJelle Bouma, Hugo Jonker, Vincent van der Meer, Eddy Van Den Aker. [doi]
- Efficient Implementation of a Post-Quantum Anonymous Credential ProtocolOlivier Blazy, Céline Chevalier, Guillaume Renaut, Thomas Ricosset, Éric Sageloli, Hugo Senet. [doi]
- Securing cloud-based military systems with Security Chaos Engineering and Artificial IntelligenceMartin Bedoya, Sara Palacios Chavarro, Daniel Díaz López, Pantaleone Nespoli, Estefania Laverde, Sebastián Suárez. [doi]
- PRAETORIAN: A Framework for the Protection of Critical Infrastructures from advanced Combined Cyber and Physical ThreatsLazaros Papadopoulos, Antonios Karteris, Dimitrios Soudris, Eva Muñoz-Navarro, Juan Jose Hernandez Montesinos, Stéphane Paul, Nicolas Museux, Sandra Kuenig, Manuel Egger, Stefan Schauer, Javier Hingant Gómez, Tamara Hadjina. [doi]
- How to hide your VM from the big bad wolf? Co-location resistance vs. resource utilisation in VM placement strategiesJens Lindemann. [doi]
- Enabling the forensic study of application-level encrypted data in Android via a Frida-based decryption frameworkCosimo Anglano, Massimo Canonico, Andrea Cepollina, Davide Freggiaro, Alderico Gallo, Marco Guazzone. [doi]
- Attack on "A Privacy-Preserving Online Ride-Hailing System Without Involving a Third Trusted Server"Srinivas Vivek 0001. [doi]
- Needle in the Haystack: Analyzing the Right of Access According to GDPR Article 15 Five Years after the ImplementationDaniela Pöhn, Niklas Mörsdorf, Wolfgang Hommel. [doi]
- SoK: A Systematic Review of TEE Usage for Developing Trusted ApplicationsArttu Paju, Muhammad Owais Javed, Juha Nurmi, Juha Savimäki, Brian McGillion, Billy Bob Brumley. [doi]
- ScasDK - A Development Kit for Security Assurance test in Multi-Network-Function 5GFrancesco Mancini, Giuseppe Bianchi 0001. [doi]
- Formal Security Analysis of Vehicle Diagnostic ProtocolsTimm Lauser, Christoph Krauß. [doi]
- Dizzy: Large-Scale Crawling and Analysis of Onion ServicesYazan Boshmaf, Isuranga Perera, Udesh Kumarasinghe, Sajitha Liyanage, Husam Al Jawaheri. [doi]
- A Concept-Based Validation Approach to Validate Security Systems for Protection of Interconnected Critical InfrastructuresTim H. Stelkens-Kobsch, Hilke Boumann, Florian Piekert, Meilin Schaper, Nils Carstengerdes. [doi]
- Investigating Impact of Fake-Type Content Poisoning Attack on NDNNoriaki Kamiyama, Takuto Kudo. [doi]
- PLC Logic-Based Cybersecurity Risks Identification for ICSMike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu. [doi]
- Cheaper than you thought? A dive into the darkweb market of cyber-crime productsDimitrios Georgoulias, Ricardo Yaben, Emmanouil Vasilomanolakis. [doi]
- A hybrid anonymization pipeline to improve the privacy-utility balance in sensitive datasets for ML purposesJenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens. [doi]
- Network Covert Channels in Routing ProtocolsMichael Schneider, Daniel Spiekermann, Jörg Keller 0001. [doi]
- Automated ICS template for STRIDE Microsoft Threat Modeling ToolMike Da Silva, Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu, Nelson Nkawa. [doi]
- Automatic incident response solutions: a review of proposed solutions' input and outputHenrik Karlzén, Teodor Sommestad. [doi]
- TRUSTEE: Towards the creation of secure, trustworthy and privacy-preserving frameworkSarwar Sayeed, Nikolaos Pitropakis, William J. Buchanan, Evangelos Markakis, Dimitra Papatsaroucha, Ilias Politis. [doi]
- Characterizing the Use of Code Obfuscation in Malicious and Benign Android AppsUlf Kargén, Noah Mauthe, Nahid Shahmehri. [doi]
- Multi-Attribute Decision Making-based Trust Score Calculation in Trust Management in IoTMichail Bampatsikos, Ilias Politis, Vaios Bolgouras, Christos Xenakis. [doi]
- Exploring NFT Validation through Digital WatermarkingMila Dalla Preda, Francesco Masaia. [doi]
- Smartphones in a Microwave: Formal and Experimental Feasibility Study on Fingerprinting the Corona-Warn-AppHenrik Graßhoff, Florian Adamsky, Stefan Schiffner. [doi]
- Cookiescanner: An Automated Tool for Detecting and Evaluating GDPR Consent Notices on WebsitesRalf Gundelach, Dominik Herrmann. [doi]
- IoT Network Attack Detection: Leveraging Graph Learning for Enhanced SecurityMohamed-Lamine Messai, Hamida Seba. [doi]
- Implementing Data Sovereignty: Requirements & Challenges from PracticeMalte Hellmeier, Julia Pampus, Haydar Qarawlus, Falk Howar. [doi]
- A Bring Your Own Device security awareness survey among professionalsGeorge Petihakis, Dimitrios Kiritsis, Aristeidis Farao, Panagiotis Bountakas, Aggeliki Panou, Christos Xenakis. [doi]
- Leveraging Knowledge Graphs For Classifying Incident Situations in ICT SystemsLionel Tailhardat, Raphaël Troncy, Yoan Chabot. [doi]
- Automated Side-Channel Attacks using Black-Box Neural Architecture SearchPritha Gupta, Jan Peter Drees, Eyke Hüllermeier. [doi]
- VeriDevOps Software Methodology: Security Verification and Validation for DevOps PracticesEduard Paul Enoiu, Dragos Truscan, Andrey Sadovykh, Wissam Mallouli. [doi]
- Real-Time Defensive Strategy Selection via Deep Reinforcement LearningAxel Charpentier, Christopher Neal, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich. [doi]
- A Generic IoT Quantum-Safe Watchdog Timer ProtocolMichael Eckel, Tanja Gutsche, Hagen Lauer, Andre Rein. [doi]
- A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated VehiclesMeriem Benyahya, Teri Lenard, Anastasija Collen, Niels Alexander Nijdam. [doi]
- Security Architecture in the SILVANUS projectNatan Orzechowski, Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk, Helen C. Leligou, Marcin Przybyszewski, Rafal Kozik, Michal Choras. [doi]
- Securing Data Exchange in the Convergence of Metaverse and IoT ApplicationsRizwan Patan, Reza M. Parizi. [doi]
- On Efficiency and Usability of Group Signatures on Smartphone and Single-board PlatformsPatrik Dobias, Lukas Malina, Petr Ilgner, Petr Dzurenda. [doi]
- A Qualitative Analysis of Illicit Arms Trafficking on Darknet MarketplacesPantelitsa Leonidou, Nikos Salamanos, Aristeidis Farao, Maria Aspri, Michael Sirivianos. [doi]
- FISMOS - An FPGA Implementation of a Security Module as Open SourcePhilipp Schubaur, Peter Knauer, Dominik Merli. [doi]
- A deep learning anomaly detection framework with explainability and robustnessManh-Dung Nguyen, Anis Bouaziz, Valeria Valdés, Ana Rosa Cavalli, Wissam Mallouli, Edgardo Montes de Oca. [doi]
- An Analysis of Stack Exchange Questions: Identifying Challenges in Software Design and Development with a Focus on Data Privacy and Data ProtectionAndreas Diepenbrock, Jonas Fleck, Sabine Sachweh. [doi]
- A Case Study with CICIDS2017 on the Robustness of Machine Learning against Adversarial Attacks in Intrusion DetectionMarta Catillo, Andrea Del Vecchio, Antonio Pecchia, Umberto Villano. [doi]
- Enhancing Cybersecurity Education in Europe: The REWIRE's Course Selection MethodologyAlan Briones Delgado, Sara Ricci, Argyro Chatzopoulou, Jakub Cegan, Petr Dzurenda, Ioannis Koutoudis. [doi]
- An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and SwitzerlandDaniel Fischer 0003, Clemens Sauerwein, Martin Werchan, Dirk Stelzer. [doi]
- A Decentralised Public Key Infrastructure for X-RoadMariia Bakhtina, Kin Long Leung, Raimundas Matulevicius, Ahmed Awad 0001, Petr Svenda. [doi]
- Adversarial Machine Learning Attacks on Multiclass Classification of IoT Network TrafficVasileios Pantelakis, Panagiotis Bountakas, Aristeidis Farao, Christos Xenakis. [doi]
- Towards Grammatical Tagging for the Legal Language of CybersecurityGianpietro Castiglione, Giampaolo Bella, Daniele Francesco Santamaria. [doi]
- Obfuscated Mobile Malware Detection by Means of Dynamic Analysis and Explainable Deep LearningFrancesco Mercaldo, Giovanni Ciaramella, Antonella Santone, Fabio Martinelli. [doi]
- Simulated environment for multiparty quantum digital signature across the networkDaniel Gómez Aguado, Marta Irene García Cid, Laura Ortiz Martín, Vicente Martín Ayuso. [doi]
- DJM-CYBER: A Joint Master in Advanced CybersecurityYianna Danidou, Sara Ricci, Antonio F. Skarmeta, Jiri Hosek, Stefano Zanero, Imre Lendak. [doi]
- Modeling Tor Network Growth by Extrapolating Consensus DataChristoph Döpmann, Florian Tschorsch. [doi]
- ICSvertase: A Framework for Purpose-based Design and Classification of ICS HoneypotsStash Kempinski, Shuaib Ichaarine, Savio Sciancalepore, Emmanuele Zambon. [doi]
- Digital Twin-Enhanced Incident Response for Cyber-Physical SystemsDavid Allison, Paul Smith 0001, Kieran McLaughlin. [doi]
- Evaluating Statistical Disclosure Attacks and Countermeasures for Anonymous Voice CallsDavid Schatz, Michael Rossberg, Guenter Schaefer. [doi]
- STIXnet: A Novel and Modular Solution for Extracting All STIX Objects in CTI ReportsFrancesco Marchiori, Mauro Conti, Nino Vincenzo Verde. [doi]
- Enabling Efficient Threshold Signature Computation via Java Card APIAntonin Dufka, Petr Svenda. [doi]
- Explainable AI-based Intrusion Detection in the Internet of ThingsMarios Siganos, Panagiotis I. Radoglou-Grammatikis, Igor Kotsiuba, Evangelos Markakis, Ioannis D. Moscholios, Sotirios K. Goudos, Panagiotis G. Sarigiannidis. [doi]
- Enabling Qualified Anonymity for Enhanced User Privacy in the Digital EraVaios Bolgouras, Kostantinos Papadamou, Ioana Stroinea, Michail Papadakis, George Gugulea, Michael Sirivianos, Christos Xenakis. [doi]
- Why Mary Can Hack: Effectively Introducing High School Girls to CybersecurityGabriele Costa 0001, Silvia de Francisci, Serenella Valiani, Paolo Prinetto. [doi]
- A Forensic I/O Recorder for Industrial Control Systems Using PLCs and OPC UAAlexios Karagiozidis, Martin Gergeleit. [doi]
- HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control SystemsMarco Lucchese, Francesco Lupia, Massimo Merro, Federica Paci, Nicola Zannone, Angelo Furfaro. [doi]
- Data Loss Prevention Solution for Linux Endpoint DevicesLukas Daubner, Adam Povazanec. [doi]
- OpenScope-sec: An ADS-B Simulator to Support the Security ResearchRiccardo Cestaro, Mauro Conti, Elonora Mancini, Federico Turrin. [doi]
- Effect of Group Based Synchronization on User Anonymity in Mix NetworksAlperen Aksoy, Dogan Kesdogan. [doi]
- Mitigating Intersection Attacks in Anonymous MicrobloggingSarah Abdelwahab Gaballah, Thanh Hoang Long Nguyen, Lamya Abdullah, Ephraim Zimmer, Max Mühlhäuser. [doi]
- AI/ML-based real-time classification of Software Defined Networking trafficAlexandru Vulpe, Cosmin Dobrin, Apostol Stefan, Alexandru Caranica. [doi]
- Tactics, Techniques and Procedures of Cybercrime: A Methodology and Tool for Cybercrime Investigation ProcessGargi Sarkar, Hardeep Singh, Subodh Kumar, Sandeep K. Shukla. [doi]
- Graph-Based Android Malware Detection and Categorization through BERT TransformerAndrea Saracino, Marco Simoni. [doi]
- Practical Verifiable & Privacy-Preserving Double AuctionsArmin Memar Zahedani, Jelle Vos, Zekeriya Erkin. [doi]
- Memory Forensics of the OpenDaylight Software-Defined Networking (SDN) ControllerAbdullah Alshaya, Adam Kardorff, Christian Facundus, Ibrahim M. Baggili, Golden G. Richard III. [doi]
- Application of Secure Two-Party Computation in a Privacy-Preserving Android AppMarco De Vincenzi, Ilaria Matteucci, Fabio Martinelli, Stefano Sebastio. [doi]
- An inclusive Lifecycle Approach for IoT Devices Trust and Identity ManagementKonstantinos Loupos, Harris Niavis, Fotis Michalopoulos, George Misiakoulis, Antonio F. Skarmeta, Jesús Garcia, Angel Palomares, Hui Song, Rustem Dautov, Francesca Giampaolo, Rosella Mancilla, Francesca Costantino, Dimitri Van Landuyt, Sam Michiels, Stefan More, Christos Xenakis, Michail Bampatsikos, Ilias Politis, Konstantinos Krilakis, Sokratis Vavilis. [doi]
- Actions Speak Louder Than Passwords: Dynamic Identity for Machine-to-Machine CommunicationWil Liam Teng, Kasper Rasmussen. [doi]
- Bypassing antivirus detection: old-school malware, new tricksEfstratios Chatzoglou, Georgios Karopoulos, Georgios Kambourakis, Zisis Tsiatsikas. [doi]
- Exploiting Digital Twin technology for Cybersecurity Monitoring in Smart GridsLuigi Coppolino, Roberto Nardone, Alfredo Petruolo, Luigi Romano, Andrej Souvent. [doi]
- Nakula: Coercion Resistant Data Storage against Time-Limited AdversaryHayyu Imanda, Kasper Rasmussen. [doi]
- A2P2 - An Android Application Patching Pipeline Based On Generic ChangesetsFlorian Draschbacher. [doi]
- HTTP/2 Attacks Generation using 5GreplayFrancesco G. Caccavale, Huu-Nghia Nguyen, Ana R. Cavalli, Edgardo Montes de Oca, Wissam Mallouli. [doi]
- The Effect of Length on Key Fingerprint Verification Security and UsabilityDan Turner, Siamak F. Shahandashti, Helen Petrie. [doi]
- Detecting a Complex Attack Scenario in an Airport: The PRAETORIAN FrameworkStefan Schauer, Tamara Hadjina, Melita Damjanovic, Eva María Muñoz Navarro, Juan Jose Hernandez Montesinos, Javier Hingant Gómez, Lazaros Papadopoulos. [doi]
- Security Analysis of the KNX Smart Building ProtocolMalte Küppers, Marko Schuba, Georg Neugebauer, Tim Hoener, Sacha Hack. [doi]
- Dynamic Cybersecurity Curriculum Optimization Method (DyCSCOM)Marko Zivanovic, Imre Lendak, Ranko Popovic. [doi]
- Easier in Reverse: Simplifying URL Reading for Phishing URLs via Reverse Domain Name NotationVincent Drury, Jakob Drees, Ulrike Meyer. [doi]
- A Practical Attack on the TLSH Similarity Digest SchemeGábor Fuchs, Roland Nagy, Levente Buttyán. [doi]
- Quantum-resistant End-to-End Secure Messaging and Email CommunicationChristoph Döberl, Wolfgang Eibner, Simon Gärtner, Manuela Kos, Florian Kutschera, Sebastian Ramacher. [doi]
- Linux-based IoT Benchmark Generator For Firmware Security Analysis ToolsDairo de Ruck, Victor Goeman, Michiel Willocx, Jorn Lapon, Vincent Naessens. [doi]
- ELECTRON: An Architectural Framework for Securing the Smart Electrical Grid with Federated Detection, Dynamic Risk Assessment and Self-HealingPanagiotis I. Radoglou-Grammatikis, Athanasios Liatifis, Christos Dalamagkas, Alexios Lekidis, Konstantinos Voulgaridis, Thomas Lagkas, Nikolaos Fotos, Sofia-Anna Menesidou, Thomas Krousarlis, Pedro Ruzafa Alcazar, Juan Francisco Martinez, Antonio F. Skarmeta, Alberto Molinuevo Martín, Iñaki Angulo, Jesus Villalobos Nieto, Hristo Koshutanski, Rodrigo Diaz Rodriguez, Ilias Siniosoglou, Orestis Mavropoulos, Konstantinos Kyranou, Theocharis Saoulidis, Allon Adir, Ramy Masalha, Emanuele Bellini 0001, Nicholas Kolokotronis, Stavros Shiaeles, Jose Garcia Franquelo, George Lalas, Andreas Zalonis, Antonis Voulgaridis, Angelina D. Bintoudi, Konstantinos Votis, David Pampliega, Panagiotis G. Sarigiannidis. [doi]
- Mitigating Privilege Misuse in Access Control through Anomaly DetectionGelareh Hasel Mehri, Inez L. Wester, Federica Paci, Nicola Zannone. [doi]
- Real-world actor-based image steganalysis via classifier inconsistency detectionDaniel Lerch-Hostalot, David Megías 0001. [doi]
- The DYNABIC approach to resilience of critical infrastructuresErkuden Rios, Eider Iturbe, Angel Rego, Nicolas Ferry 0001, Jean-Yves Tigli, Stéphane Lavirotte, Gérald Rocher, Phu Hong Nguyen, Hui Song, Rustem Dautov, Wissam Mallouli, Ana Rosa Cavalli. [doi]
- Approach to harmonisation of technological solutions, operating procedures, preparedness and cross-sectorial collaboration opportunities for first aid response in cross-border mass-casualty incidentsYantsislav Yanakiev, Sergio López Bernal, Alberto Montarelo Navajo, Nikolai Stoianov, Manuel Gil Pérez, Carmen Curto Martin. [doi]
- User Acceptance Criteria for Privacy Preserving Machine Learning TechniquesSascha Löbner, Sebastian Pape 0001, Vanessa Bracamonte. [doi]
- Confidential Quantum ComputingBarbora Hrdá, Sascha Wessel. [doi]
- An Improved Honeypot Model for Attack Detection and AnalysisMarwan Abbas-Escribano, Hervé Debar. [doi]
- The Curation Mechanism for the Czech National Qualifications Framework in CybersecurityFrantisek Kasl, Pavel Loutocký, Jakub Vostoupal. [doi]
- You Only Get One-Shot: Eavesdropping Input Images to Neural Network by Spying SoC-FPGA Internal BusMay Myat Thu, Maria Méndez Real, Maxime Pelcat, Philippe Besnier. [doi]
- Artificial Intelligence for next generation cybersecurity: The AI4CYBER frameworkEider Iturbe, Erkuden Rios, Angel Rego, Nerea Toledo. [doi]
- Mitigate Data Poisoning Attack by Partially Federated LearningKhanh-Huu-The Dam, Axel Legay. [doi]
- JITScanner: Just-in-Time Executable Page Check in the Linux Operating SystemPasquale Caporaso, Giuseppe Bianchi 0001, Francesco Quaglia. [doi]
- Risk Assessments in Virtual Power Plants with NESCOR Criteria, Practical Application, Advantages and DisadvantagesGeorgios Gkoktsis, Hagen Lauer, Lukas Jäger. [doi]
- Fingerprint forgery training: Easy to learn, hard to performAgata Kruzikova, Vashek Matyas. [doi]
- Long-Term Analysis of the Dependability of Cloud-based NISQ Quantum ComputersChuanqi Xu, Jakub Szefer. [doi]
- A Quic(k) Security Overview: A Literature Research on Implemented Security RecommendationsStefan Tatschner, Sebastian N. Peters, David Emeis, John Morris, Thomas Newe. [doi]
- New Identity-Based Identification and Signature Schemes in the Standard ModelSyh-Yuan Tan, Swee-Huay Heng. [doi]
- Fairness of AI in Predicting the Risk of Recidivism: Review and Phase Mapping of AI Fairness TechniquesMichael Mayowa Farayola, Irina Tal, Malika Bendechache, Takfarinas Saber, Regina Connolly. [doi]
- An Analysis of PhotoDNAMartin Steinebach. [doi]
- RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving PrivacyStephan Krenn, Jan Orlicky, Daniel Slamanig, Tomas Trpisovský. [doi]
- Securing Federated GANs: Enabling Synthetic Data Generation for Health Registry ConsortiumsNarasimha Raghavan Veeraragavan, Jan Franz Nygård. [doi]
- Characterizing the MasterPrint threat on Android devices with capacitive sensorsMiguel Peidro-Paredes, José María de Fuentes, Lorena González-Manzano, Miguel Velasco-Gomez. [doi]
- Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum ValidatorsAlpesh Bhudia, Anna Cartwright 0001, Edward J. Cartwright, Darren Hurley-Smith, Julio Hernandez-Castro. [doi]
- SoK: Practical Detection of Software Supply Chain AttacksMarc Ohm, Charlene Stuke. [doi]
- Breaching the Defense: Investigating FGSM and CTGAN Adversarial Attacks on IEC 60870-5-104 AI-enabled Intrusion Detection SystemsDimitrios Christos Asimopoulos, Panagiotis I. Radoglou-Grammatikis, Ioannis Makris, Valeri M. Mladenov, Konstantinos E. Psannis, Sotirios K. Goudos, Panagiotis G. Sarigiannidis. [doi]
- Cross-Domain Sharing of User Claims: A Design Proposal for OpenID Connect Attribute AuthoritiesAmir Sharif, Francesco Antonio Marino, Giada Sciarretta, Giuseppe De Marco, Roberto Carbone, Silvio Ranise. [doi]
- CACS: A Cloud Privacy-Preserving Attribute Management SystemAivo Kalu, Burak Can Kus, Peeter Laud, Kin Long Leung, Nikita Snetkov, Jelizaveta Vakarjuk. [doi]
- Curricula Designer with Enhanced ECSF AnalysisJan Hajny, Marek Sikora, Konstantinos Adamos, Fabio Di Franco. [doi]
- A Survey of Steganography Tools at Layers 2-4 and HTTPStefano Bistarelli, Michele Ceccarelli, Chiara Luchini, Ivan Mercanti, Francesco Santini 0001. [doi]
- Survey on Digital Twins: from concepts to applicationsJessica B. Heluany, Vasileios Gkioulos. [doi]
- On Deploying Quantum-Resistant Cybersecurity in Intelligent InfrastructuresLukas Malina, Patrik Dobias, Jan Hajny, Kim-Kwang Raymond Choo. [doi]
- Digital Forensics Triage App for AndroidJannik Neth, Marko Schuba, Karsten Brodkorb, Georg Neugebauer, Tim Hoener, Sacha Hack. [doi]
- Universal Remote Attestation for Cloud and Edge PlatformsSimon Ott, Monika Kamhuber, Joana Pecholt, Sascha Wessel. [doi]
- Security level evaluation with F4SLEMari Seeba, Tarmo Oja, Maria Pibilota Murumaa, Václav Stupka. [doi]
- Rogue key and impersonation attacks on FIDO2: From theory to practiceManuel Barbosa, André Cirne, Luís Esquível. [doi]
- Program Characterization for Software Exploitation DetectionAyman Youssef, Mohamed Abdelrazek 0001, Chandan K. Karmakar. [doi]
- Key Management Systems for Large-Scale Quantum Key Distribution NetworksPaul James, Stephan Laschet, Sebastian Ramacher, Luca Torresetti. [doi]
- Securing the Flow: Security and Privacy Tools for Flow-based ProgrammingThodoris Ioannidis, Vaios Bolgouras, Christos Xenakis, Ilias Politis. [doi]
- Canary in Twitter Mine: Collecting Phishing Reports from Experts and Non-expertsHiroki Nakano, Daiki Chiba 0001, Takashi Koide, Naoki Fukushi, Takeshi Yagi, Takeo Hariu, Katsunari Yoshioka, Tsutomu Matsumoto. [doi]
- Secure Multi-User Contract Certificate Management for ISO 15118-20 Using Hardware IdentitiesChristian Plappert, Lukas Jäger, Alexander Irrgang, Chandrasekhar Potluri. [doi]
- Creating a Decryption Proof Verifier for the Estonian Internet Voting SystemJan Willemson. [doi]
- RETRACT: Expressive Designated Verifier Anonymous CredentialsHeini Bergsson Debes, Thanassis Giannetsos. [doi]
- Privacy Impact Assessment of Cyber Attacks on Connected and Autonomous VehiclesSakshyam Panda, Emmanouil Panaousis, George Loukas, Konstantinos Kentrotis. [doi]
- Modern NetFlow network dataset with labeled attacks and detection methodsMikolaj Komisarek, Marek Pawlicki, Tomi Simic, David Kavcnik, Rafal Kozik, Michal Choras. [doi]
- IoT Security Seminar: Raising Awareness and Sharing Critical KnowledgeVictor Goeman, Dairo de Ruck, Ilse Bohé, Jorn Lapon, Vincent Naessens. [doi]
- Trust Scheme Interoperability: Connecting Heterogeneous Trust SchemesStefan More. [doi]
- Exploring Federated Learning for Speech-based Parkinson's Disease DetectionAthanasios Sarlas, Alexandros Kalafatelis, Georgios Alexandridis, Michail-Alexandros Kourtis, Panagiotis Trakadas. [doi]
- Automatic Test Generation to Improve Scrum for Safety Agile MethodologyMario Barbareschi, Salvatore Barone, Valentina Casola, Salvatore Della Torca, Daniele Lombardi. [doi]
- Towards the Definition of Cognitive Warfare and Related Countermeasures: A Systematic ReviewFrida Muñoz Plaza, Marco Antonio Sotelo Monge, Hector Gonzalez Ordi. [doi]
- Adoption of Information Security Practices in Large-Scale Agile Software Development: A Case Study in the Finance IndustrySascha Nägele, Lorena Korn, Florian Matthes. [doi]
- SoK: Modeling Explainability in Security Analytics for Interpretability, Trustworthiness, and UsabilityDipkamal Bhusal, Rosalyn Shin, Ajay Ashok Shewale, Monish Kumar Manikya Veerabhadran, Michael Clifford, Sara Rampazzi, Nidhi Rastogi. [doi]
- TASEP: A Collaborative Social Engineering Tabletop Role-Playing Game to Prevent Successful Social Engineering AttacksLukas Hafner, Florian Wutz, Daniela Pöhn, Wolfgang Hommel. [doi]
- Beware the Doppelgänger: Attacks against Adaptive Thresholds in Facial Recognition SystemsWillem Verheyen, Tim Van hamme, Sander Joos, Davy Preuveneers, Wouter Joosen. [doi]