Abstract is missing.
- Automating Side-Channel Testing for Embedded Systems: A Continuous Integration ApproachPhilipp Schloyer, Peter Knauer, Bernhard Bauer, Dominik Merli. [doi]
- Robust and Homomorphic Covert Channels in Streams of Numeric DataJörg Keller 0001, Carina Heßeling, Steffen Wendzel. [doi]
- Sustainability in Digital ForensicsSabrina Friedl, Charlotte Zajewski, Günther Pernul. [doi]
- OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band ChannelsMo Zhang, Eduard Marin, Mark Ryan 0001, Vassilis Kostakos, Toby Murray, Benjamin Tag, David F. Oswald. [doi]
- SoK: A Comparison of Autonomous Penetration Testing AgentsRaphael Simon, Wim Mees. [doi]
- A Risk Assessment and Legal Compliance Framework for Supporting Personal Data Sharing with Privacy Preservation for Scientific ResearchChristos Baloukas, Lazaros Papadopoulos, Kostas Demestichas, Axel Weissenfeld, Sven Schlarb, Mikel Aramburu, David Redó, Jorge García, Seán Gaines, Thomas Marquenie, Ezgi Eren, Irmak Erdogan Peter. [doi]
- Blue Skies from (X?s) Pain: A Digital Forensic Analysis of Threads and BlueskyJoseph Brown, Abdur Rahman Onik, Ibrahim Baggili. [doi]
- Forensic Analysis of Artifacts from Microsoft's Multi-Agent LLM Platform AutoGenClinton Walker, Taha Gharaibeh, Ruba Alsmadi, Cory Lloyd Hall, Ibrahim Baggili. [doi]
- Leveraging Overshadowing for Time-Delay Attacks in 4G/5G Cellular Networks: An Empirical AssessmentVirgil Hamici-Aubert, Julien Saint-Martin, Renzo E. Navas, Georgios Z. Papadopoulos, Guillaume Doyen, Xavier Lagrange. [doi]
- A Unified Framework for GDPR Compliance in Cloud ComputingArgyri Pattakou, Vasiliki Diamantopoulou, Christos Kalloniatis, Stefanos Gritzalis. [doi]
- Automated Passport Control: Mining and Checking Models of Machine Readable Travel DocumentsStefan Marksteiner, Marjan Sirjani, Mikael Sjödin. [doi]
- Assessing the Performance of Ethereum and Hyperledger Fabric Under DDoS Attacks for Cyber-Physical SystemsVijay Jayadev, Naghmeh Moradpoor, Andrei Petrovski 0001. [doi]
- Towards Reducing Business-Risk of Data Theft Implementing Automated Simulation Procedures of Evil Data ExfiltrationMichael Mundt, Harald Baier, Antje Raab-Düsterhöft. [doi]
- Don't, Stop, Drop, Pause: Forensics of CONtainer CheckPOINTs (ConPoint)Taha Gharaibeh, Steven Seiden, Mohamed Abouelsaoud, Elias Bou-Harb, Ibrahim M. Baggili. [doi]
- Continuous Authentication Leveraging Matrix ProfileLuis Ibanez-Lissen, José María de Fuentes, Lorena González-Manzano, Nicolas Anciaux. [doi]
- Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS ConnectionsDiana Gratiela Berbecaru, Antonio Lioy. [doi]
- An Identity Key Management System with Deterministic Key Hierarchy for SSI-native Internet of ThingsAlice Colombatto, Luca Giorgino, Andrea Vesco. [doi]
- Modeling Human Error Factors with Security Incidents in Industrial Control Systems: A Bayesian Belief Network ApproachPushparaj Bhosale, Wolfgang Kastner, Thilo Sauter. [doi]
- Identification of industrial devices based on payloadOndrej Pospisil, Radek Fujdiak. [doi]
- FedHE-Graph: Federated Learning with Hybrid Encryption on Graph Neural Networks for Advanced Persistent Threat DetectionAtmane Ayoub Mansour Bahar, Kamel Soaïd Ferrahi, Mohamed-Lamine Messai, Hamida Seba, Karima Amrouche. [doi]
- Just Rewrite It Again: A Post-Processing Method for Enhanced Semantic Similarity and Privacy Preservation of Differentially Private Rewritten TextStephen Meisenbacher, Florian Matthes. [doi]
- Beyond the Bugs: Enhancing Bug Bounty Programs through Academic PartnershipsAndrej Kristofík, Jakub Vostoupal, Kamil Malinka, Frantisek Kasl, Pavel Loutocký. [doi]
- DealSecAgg: Efficient Dealer-Assisted Secure Aggregation for Federated LearningJoshua Stock, Henry Heitmann, Janik Noel Schug, Daniel Demmler. [doi]
- Gateway to the Danger Zone: Secure and Authentic Remote Reset in Machine SafetySebastian N. Peters, Nikolai Puch, Michael P. Heinl, Philipp Zieris, Mykolai Protsenko, Thorsten Larsen-Vefring, Marcel Ely Gomes, Aliza Maftun, Thomas Zeschg. [doi]
- Attack Analysis and Detection for the Combined Electric Vehicle Charging and Power Grid DomainsDustin Kern, Christoph Krauß, Matthias Hollick. [doi]
- Analysis of the Capability and Training of Chat Bots in the Generation of Rules for Firewall or Intrusion Detection SystemsBernardo Louro, Raquel Abreu, Joana Cabral Costa, João B. F. Sequeiros, Pedro R. M. Inácio. [doi]
- ZW-IDS: Zero-Watermarking-based network Intrusion Detection System using data provenanceOmair Faraj, David Megías 0001, Joaquín García-Alfaro. [doi]
- Multimodal Security Mechanisms for Critical Time Systems using blockchain in Chriss projectMari-Anais Sachian, George Suciu, Maria Niculae, Adrian Paun, Petrica Ciotirnae, Ivan Horatiu, Cristina Tudor, Robert Florescu. [doi]
- Single-image steganalysis in real-world scenarios based on classifier inconsistency detectionDaniel Lerch-Hostalot, David Megías Jimenez. [doi]
- A Quantitative Analysis of Inappropriate Content, Age Rating Compliance, and Risks to Youth on the Whisper PlatformJeng-Yu Chou, Brian Levine. [doi]
- Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology EnvironmentsMohammad Reza Nosouhi, Zubair A. Baig, Robin Doss, Divyans Mahansaria, Debi Prasad Pati, Praveen Gauravaram, Lei Pan 0002, Keshav Sood. [doi]
- Let Them Drop: Scalable and Efficient Federated Learning Solutions Agnostic to StragglersRiccardo Taiello, Melek Önen, Clémentine Gritti, Marco Lorenzi. [doi]
- Behavioural Modelling for Sustainability in Smart HomesLuca Ardito. [doi]
- Dealing with Bad Apples: Organizational Awareness and Protection for Bit-flip and Typo-Squatting AttacksHuancheng Hu, Afshin Zivi, Christian Doerr. [doi]
- Telemetry data sharing based on Attribute-Based Encryption schemes for cloud-based Drone Management systemAlexandr Silonosov, Lawrence Henesey. [doi]
- Developing a Call Detail Record Generator for Cultural Heritage Preservation and Theft Mitigation: Applications and ImplicationsRobert-Ionut Vatasoiu, Alexandru Vulpe, Robert Florescu, Mari-Anais Sachian, George Suciu. [doi]
- EmuFlex: A Flexible OT Testbed for Security Experiments with OPC UAAlexander Giehl, Michael P. Heinl, Victor Embacher. [doi]
- SECL: A Zero-Day Attack Detector and Classifier based on Contrastive Learning and Strong RegularizationRobin Duraz, David Espes, Julien Francq, Sandrine Vaton. [doi]
- Towards Secure Virtual Elections: Multiparty Computation of Order Based Voting RulesTamir Tassa, Lihi Dery. [doi]
- Article 45 of the eIDAS Directive Unveils the need to implement the X.509 4-cornered trust model for the WebPKIAhmad Samer Wazan, Romain Laborde, Abdelmalek Benzekri, Imran Taj. [doi]
- Identity and Access Management Architecture in the SILVANUS ProjectPawel Rajba, Natan Orzechowski, Karol Rzepka, Przemyslaw Szary, Dawid Nastaj, Krzysztof Cabaj. [doi]
- Trust-minimizing BDHKE-based e-cash mint using secure hardware and distributed computationAntonin Dufka, Jakub Janku, Petr Svenda. [doi]
- Secure Noise Sampling for DP in MPC with Finite PrecisionHannah Keller, Helen Möllering, Thomas Schneider 0003, Oleksandr Tkachenko, Liang Zhao. [doi]
- On Implementing Linear Regression on Homomorphically Encrypted Data: A Case-StudyGianluca Dini. [doi]
- Advanced methods for generalizing time and duration during dataset anonymizationJenno Verdonck, Kevin De Boeck, Michiel Willocx, Vincent Naessens. [doi]
- Let the Users Choose: Low Latency or Strong Anonymity? Investigating Mix Nodes with Paired Mixing TechniquesSarah Abdelwahab Gaballah, Lamya Abdullah, Max Mühlhäuser, Karola Marky. [doi]
- Forensic Investigation of An Android Jellybean-based Car Audio Video Navigation SystemYejin Yoon, Jeehun Jung, Seong Je Cho, Jongmoo Choi, Minkyu Park, Sangchul Han. [doi]
- Further Insights: Balancing Privacy, Explainability, and Utility in Machine Learning-based Tabular Data AnalysisWisam Abbasi, Paolo Mori, Andrea Saracino. [doi]
- Enhancing Algorithmic Fairness: Integrative Approaches and Multi-Objective Optimization Application in Recidivism ModelsMichael Mayowa Farayola, Malika Bendechache, Takfarinas Saber, Regina Connolly, Irina Tal. [doi]
- Extracting Randomness from Nucleotide Sequencers for use in a Decentralised Randomness BeaconDarren Hurley-Smith, Alastair P. Droop, Remy Lyon, Roxana Teodor. [doi]
- NEWSROOM: Towards Automating Cyber Situational Awareness Processes and Tools for Cyber DefenceMarkus Wurzenberger, Stephan Krenn, Max Landauer, Florian Skopik, Cora Perner, Jarno Lötjönen, Jani Päijänen, Georgios Gardikis, Nikos Alabasis, Liisa Sakerman, Kristiina Omri, Juha Röning, Kimmo Halunen, Vincent Thouvenot, Martin Weise, Andreas Rauber, Vasileios Gkioulos, Sokratis K. Katsikas, Luigi Sabetta, Jacopo Bonato, Rocío Ortíz, Daniel Navarro, Nikolaos Stamatelatos, Ioannis Avdoulas, Rudolf Mayer, Andreas Ekelhart, Ioannis Giannoulakis, Emmanouil Kafetzakis, Antonello Corsi, Ulrike Lechner, Corinna Schmitt. [doi]
- Exploring the influence of the choice of prior of the Variational Auto-Encoder on cybersecurity anomaly detectionTengfei Yang, Yuansong Qiao, Brian Lee 0001. [doi]
- Immutability and non-repudiation in the exchange of key messages within the EU IoT-Edge-Cloud ContinuumSalvador Cuñat, Raúl Reinosa Simón, Ignacio Lacalle, Carlos Enrique Palau. [doi]
- Evaluation of Cyber Situation Awareness - Theory, Techniques and ApplicationsGeorgi Nikolov, Axelle Perez, Wim Mees. [doi]
- The PRECINCT Ecosystem Platform for Critical Infrastructure Protection: Architecture, Deployment and TransferabilityDjibrilla Amadou Kountché, Jocelyn Aubert, Manh-Dung Nguyen, Natalia Kalfa, Nicola Gregorio Durante, Cristiano Passerini, Stephane Kuding. [doi]
- Deployment of Cybersecurity Controls in the Norwegian Industry 4.0Kristian Kannelønning, Sokratis K. Katsikas. [doi]
- SoK: Automated Software Testing for TLS LibrariesBen Swierzy, Felix Boes, Timo Pohl, Christian Bungartz, Michael Meier 0001. [doi]
- DistIN: Analysis and Validation of a Concept and Protocol for Distributed Identity Information NetworksMichael Hofmeier, Daniela Pöhn, Wolfgang Hommel. [doi]
- Operation Assessment in cyberspace: Understanding the effects of Cyber DeceptionSalvador Llopis Sánchez, David Lopes Antunes. [doi]
- Enhancing Secure Deployment with Ansible: A Focus on Least Privilege and Automation for LinuxEddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rutschle, Abdelmalek Benzekri. [doi]
- Detection of AI-Generated Emails - A Case StudyPawel Gryka, Kacper T. Gradon, Marek Kozlowski, Milosz Kutyla, Artur Janicki. [doi]
- Give Me Steam: A Systematic Approach for Handling Stripped Symbols in Memory Forensics of the Steam DeckRuba Alsmadi, Taha Gharaibeh, Andrew Webb, Ibrahim M. Baggili. [doi]
- Transfer Adversarial Attacks through Approximate ComputingValentina Casola, Salvatore Della Torca. [doi]
- Event-based Data Collection and Analysis in the Cyber Range EnvironmentWilli Lazarov, Samuel Janek, Zdenek Martinasek, Radek Fujdiak. [doi]
- Network Intrusion Response using Deep Reinforcement Learning in an Aircraft IT-OT ScenarioMatthew Reaney, Kieran McLaughlin, James Grant. [doi]
- The Right to Be Zero-Knowledge ForgottenIvan Visconti. [doi]
- Using Artificial Intelligence in Cyber Security Risk Management for Telecom Industry 4.0Ijeoma Ebere-Uneze, Syed Naqvi. [doi]
- Accuracy Evaluation of SBOM Tools for Web Applications and System-Level SoftwareAndreas Halbritter, Dominik Merli. [doi]
- Comparative Analysis and Implementation of Jump Address Masking for Preventing TEE Bypassing Fault AttacksShoei Nashimoto, Rei Ueno, Naofumi Homma. [doi]
- A Model-based Approach for Assessing the Security of Cyber-Physical SystemsHugo Teixeira De Castro, Ahmed Hussain, Gregory Blanc, Jamal El Hachem, Dominique Blouin, Jean Leneutre, Panos Papadimitratos. [doi]
- A Case Study on the Detection of Hash-Chain-based Covert Channels Using Heuristics and Machine LearningJeff Schymiczek, Tobias Schmidbauer, Steffen Wendzel. [doi]
- Chain Links on Wheels: A Security Scheme for IoV Connectivity through Blockchain IntegrationIbtisam Ehsan, Muhammad Irfan Khalid, Markus Helfert, Mansoor Ahmed. [doi]
- Prov2vec: Learning Provenance Graph Representation for Anomaly Detection in Computer SystemsBibek Bhattarai, H. Howie Huang. [doi]
- SoK: Visualization-based Malware Detection TechniquesMatteo Brosolo, Vinod Puthuvath, Asmitha KA, Rafidha Rehiman K. A., Mauro Conti. [doi]
- NORIA UI: Efficient Incident Management on Large-Scale ICT Systems Represented as Knowledge GraphsLionel Tailhardat, Yoan Chabot, Antoine Py, Perrine Guillemette. [doi]
- Increasing the Confidence in Security Assurance Cases using Game TheoryAntonia Welzel, Rebekka Wohlrab, Mazen Mohamad. [doi]
- SOVEREIGN - Towards a Holistic Approach to Critical Infrastructure ProtectionGeorg Becker, Thomas Eisenbarth 0001, Hannes Federrath, Mathias Fischer 0001, Nils Loose, Simon Ott, Joana Pecholt, Stephan Marwedel, Dominik Meyer, Jan Stijohann, Anum Talpur, Matthias Vallentin. [doi]
- BenchIMP: A Benchmark for Quantitative Evaluation of the Incident Management Process AssessmentAlessandro Palma, Nicola Bartoloni, Marco Angelini. [doi]
- Acceleration of DICE Key Generation using Key CachingDominik Lorych, Lukas Jäger, Andreas Fuchs 0002. [doi]
- Trustworthiness and explainability of a watermarking and machine learning-based system for image modification detection to combat disinformationAndrea Rosales, Agnieszka Malanowska, Tanya Koohpayeh Araghi, Minoru Kuribayashi, Marcin Kowalczyk, Daniel Blanche-Tarragó, Wojciech Mazurczyk, David Megías 0001. [doi]
- Image-based detection and classification of Android malware through CNN modelsAlessandro Aldini, Tommaso Petrelli. [doi]
- A Privacy Measure Turned Upside Down? Investigating the Use of HTTP Client Hints on the WebStephan Wiefling, Marian Hönscheid, Luigi Lo Iacono. [doi]
- Integrating Hyperledger Fabric with Satellite Communications: A Revolutionary Approach for Enhanced Security and Decentralization in Space NetworksAnastassios Voudouris, Aristeidis Farao, Aggeliki Panou, John Polley, Christos Xenakis. [doi]
- Service Provider Accreditation: Enabling and Enforcing Privacy-by-Design in Credential-based Authentication SystemsStefan More, Jakob Heher, Edona Fasllija, Maximilian Mathie. [doi]
- Using DNS Patterns for Automated Cyber Threat AttributionCristoffer Leite, Jerry den Hartog, Daniel Ricardo Dos Santos. [doi]
- Towards 5G Advanced network slice assurance through isolation mechanismsAlexios Lekidis. [doi]
- A Comprehensive Pattern-based Overview of StegomalwareFabian Strachanski, Denis Petrov, Tobias Schmidbauer, Steffen Wendzel. [doi]
- NITRO: an Interconnected 5G-IoT Cyber RangeAristeidis Farao, Christoforos Ntantogian, Stylianos Karagiannis, Emmanouil Magkos, Alexandra Dritsa, Christos Xenakis. [doi]
- Compromising anonymity in identity-reserved k-anonymous datasets through aggregate knowledgeKevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens. [doi]
- Systematic Analysis of Label-flipping Attacks against Federated Learning in Collaborative Intrusion Detection SystemsLéo Lavaur, Yann Busnel, Fabien Autrel. [doi]
- A Systematic Review of Contemporary Applications of Privacy-Aware Graph Neural Networks in Smart CitiesJingyan Zhang, Irina Tal. [doi]
- Evaluating the impact of contextual information on the performance of intelligent continuous authentication systemsPedro Miguel Sánchez Sánchez, Adrián Abenza Cano, Alberto Huertas Celdrán, Gregorio Martínez Pérez. [doi]
- Anomaly-Based Intrusion Detection for Blackhole Attack MitigationAshraf Abdelhamid, Mahmoud Said Elsayed, Heba K. Aslan, Marianne A. Azer. [doi]
- Toward a Log-based Anomaly Detection System for Cyber Range PlatformsFrancesco Blefari, Francesco Aurelio Pironti, Angelo Furfaro. [doi]
- A Multi-layer Approach through Threat Modelling and Attack Simulation for Enhanced Cyber Security AssessmentEider Iturbe, Javier Arcas, Erkuden Rios, Nerea Toledo. [doi]
- Secure and Privacy-Preserving Car-Sharing SystemsLukas Malina, Petr Dzurenda, Norbert Lövinger, Ijeoma Faustina Ekeh, Raimundas Matulevicius. [doi]
- Towards Functions for Verifiable Credentials in a 2-Holder ModelMarkus Batz, Sebastian Zickau. [doi]
- SYNAPSE - An Integrated Cyber Security Risk & Resilience Management Platform, With Holistic Situational Awareness, Incident Response & Preparedness Capabilities: SYNAPSEPanagiotis Bountakas, Konstantinos Fysarakis, Thomas Kyriakakis, Panagiotis Karafotis, Aristeidis Sotiropoulos, Maria Tasouli, Cristina Alcaraz, George Alexandris, Vassiliki Andronikou, Tzortzia Koutsouri, Romarick Yatagha, George Spanoudakis, Sotiris Ioannidis, Fabio Martinelli, Oleg Illiashenko. [doi]
- A Web Browser Plugin for Users' Security AwarenessThomas Hoad, Erisa Karafili. [doi]
- ParsEval: Evaluation of Parsing Behavior using Real-world Out-in-the-wild X.509 CertificatesStefan Tatschner, Sebastian N. Peters, Michael P. Heinl, Tobias Specht, Thomas Newe. [doi]
- A tool for IoT Firmware CertificationGiuseppe Marco Bianco, Luca Ardito, Michele Valsesia. [doi]
- Long-Lived Verifiable Credentials: Ensuring Durability Beyond the Issuer's LifetimeRicardo Bochnia, Jürgen Anke. [doi]
- How to evade modern web cryptojacking detection tools? A review of practical findingsKrzysztof Chmiel, Pawel Rajba. [doi]
- A SOAR platform for standardizing, automating operational processes and a monitoring service facilitating auditing procedures among IoT trustworthy environmentsVasiliki-Georgia Bilali, Eustratios Magklaris, Dimitrios Kosyvas, Lazaros Karagiannidis, Eleftherios Ouzounoglou, Angelos Amditis. [doi]
- The State of Boot Integrity on Linux - a Brief ReviewRobert Haas, Martin Pirker. [doi]
- Tackling the cybersecurity workforce gap with tailored cybersecurity study programs in Central and Eastern EuropeMarko Zivanovic, Imre Lendák, Ranko Popovic. [doi]
- HeMate: Enhancing Heap Security through Isolating Primitive Types with Arm Memory Tagging ExtensionYu-Chang Chen, Shih-wei Li. [doi]
- Entity Recognition on Border SecurityGeorge Suciu, Mari-Anais Sachian, Razvan-Alexandru Bratulescu, Kejsi Koci, Grigor Parangoni. [doi]
- Investigating HTTP Covert Channels Through Fuzz TestingKai Hölk, Wojciech Mazurczyk, Marco Zuppelli, Luca Caviglione. [doi]
- A Trust and Reputation System for Examining Compliance with Access ControlThomas Baumer, Johannes Grill, Jacob Adan, Günther Pernul. [doi]
- Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol ImplementationsArthur Tran Van, Olivier Levillain, Hervé Debar. [doi]
- The Cyber Safe Position: An STPA for Safety, Security, and Resilience Co-Engineering ApproachGeorgios Gkoktsis, Ludger Peters. [doi]
- Elevating TARA: A Maturity Model for Automotive Threat Analysis and Risk AssessmentManfred Vielberth, Kristina Raab, Magdalena Glas, Patrick Grümer, Günther Pernul. [doi]
- On the Application of Natural Language Processing for Advanced OSINT Analysis in Cyber DefenceFlorian Skopik, Benjamin Akhras, Elisabeth Woisetschläger, Medina Andresel, Markus Wurzenberger, Max Landauer. [doi]
- A Framework Towards Assessing the Resilience of Urban Transport SystemsGérald Rocher, Jean-Yves Tigli, Stéphane Lavirotte, Nicolas Ferry 0001. [doi]
- Vulnerability detection tool in source code by building and leveraging semantic code graphSabine Delaître, José Maria Pulgar Gutiérrez. [doi]
- A comprehensive evaluation of interrupt measurement techniques for predictability in safety-critical systemsDaniele Lombardi, Mario Barbareschi, Salvatore Barone, Valentina Casola. [doi]
- Adversary Tactic Driven Scenario and Terrain Generation with Partial Infrastructure SpecificationÁdám Ruman, Martin Drasar, Lukás Sadlek, Shanchieh Jay Yang, Pavel Celeda. [doi]
- Enhancing Cybersecurity Curriculum Development: AI-Driven Mapping and Optimization TechniquesPetr Dzurenda, Sara Ricci, Marek Sikora, Michal Stejskal, Imre Lendák, Pedro Adão. [doi]
- Security Analysis of a Decentralized, Revocable and Verifiable Attribute-Based Encryption SchemeThomas Prantl, Marco Lauer, Lukas Horn, Simon Engel, David Dingel, André Bauer 0001, Christian Krupitzer, Samuel Kounev. [doi]
- No Country for Leaking Containers: Detecting Exfiltration of Secrets Through AI and SyscallsMarco Zuppelli, Massimo Guarascio 0001, Luca Caviglione, Angelica Liguori. [doi]
- Unveiling the Darkness: Analysing Organised Crime on the Wall Street Market Darknet Marketplace using PGP Public KeysShiying Fan, Paul Moritz Ranly, Lukas Graner, Inna Vogel, Martin Steinebach. [doi]
- An Exploratory Case Study on Data Breach JournalismJukka Ruohonen, Kalle Hjerppe, Maximilian von Zastrow. [doi]
- AI4SOAR: A Security Intelligence Tool for Automated Incident ResponseManh-Dung Nguyen, Wissam Mallouli, Ana Rosa Cavalli, Edgardo Montes de Oca. [doi]
- The Trade-off Between Privacy & Quality for Counterfactual ExplanationsSjoerd Berning, Vincent Dunning, Dayana Spagnuelo, Thijs Veugen, Jasper van der Waa. [doi]
- A Large-Scale Study on the Prevalence and Usage of TEE-based Features on AndroidDavide Bove. [doi]
- A Framework for In-network Inference using P4Huu-Nghia Nguyen, Manh-Dung Nguyen, Edgardo Montes de Oca. [doi]
- GNN-IDS: Graph Neural Network based Intrusion Detection SystemZhenlu Sun, André M. H. Teixeira, Salman Toor. [doi]
- Analysis of the Windows Control Flow GuardNiels Pfau, Patrick Kochberger. [doi]
- A Metalanguage for Dynamic Attack Graphs and Lazy GenerationViktor Engström, Giuseppe Nebbione, Mathias Ekstedt. [doi]
- Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11Patrício Domingues, Miguel Frade, Miguel Negrão. [doi]
- Towards the adoption of automated cyber threat intelligence information sharing with integrated risk assessmentValeria Valdés Ríos, Fatiha Zaïdi, Ana Rosa Cavalli, Angel Rego. [doi]
- Graph-Based Spectral Analysis for Detecting Cyber AttacksMajed Jaber, Nicolas Boutry, Pierre Parrend. [doi]
- Navigating the landscape of IoT security and associated risks in critical infrastructuresAndrej Pastorek, Andrea Tundis. [doi]
- Quantum-Resistant and Secure MQTT CommunicationLukas Malina, Patrik Dobias, Petr Dzurenda, Gautam Srivastava 0001. [doi]
- Anomaly detection mechanisms for in-vehicle and V2X systemsAlexios Lekidis. [doi]
- Monitor-based Testing of Network Protocol Implementations Using Symbolic ExecutionHooman Asadian, Paul Fiterau-Brostean, Bengt Jonsson 0001, Konstantinos Sagonas. [doi]
- Natural Language Steganography by ChatGPTMartin Steinebach. [doi]
- Vulnerability management digital twin for energy systemsJessica B. Heluany, Johannes Götzfried, Bernhard Mehlig, Vasileios Gkioulos. [doi]
- AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacksGeorgios Petihakis 0002, Aristeidis Farao, Panagiotis Bountakas, Athanasia Sabazioti, John Polley, Christos Xenakis. [doi]
- An IEC 62443-security oriented domain specific modelling languageJolahn Vaudey, Stéphane Mocanu, Gwenaël Delaval, Éric Rutten. [doi]
- ARGAN-IDS: Adversarial Resistant Intrusion Detection Systems using Generative Adversarial NetworksJoão Costa, Filipe Apolinário, Carlos Ribeiro. [doi]
- SoK: A Unified Data Model for Smart Contract Vulnerability TaxonomiesClaudia Ruggiero, Pietro Mazzini, Emilio Coppa, Simone Lenti, Silvia Bonomi. [doi]
- SoK: How Artificial-Intelligence Incidents Can Jeopardize Safety and SecurityRichard May 0003, Jacob Krüger, Thomas Leich. [doi]
- How to Find out What's Going on in Encrypted Smart Meter Networks - without Decrypting AnythingOliver Eigner, Hubert Schölnast, Paul Tavolato. [doi]
- Evaluating Cybersecurity Risk: A Comprehensive Comparison of Vulnerability Scoring MethodologiesKonstantina Milousi, Prodromos Kiriakidis, Notis Mengidis, Georgios Rizos, Mariana S. Mazi, Antonis Voulgaridis, Konstantinos Votis, Dimitrios Tzovaras. [doi]
- Forensic Investigation of Humanoid Social Robot: A Case Study on Zenbo RobotFarkhund Iqbal, Abdullah Kazim, Áine MacDermott, Richard Ikuesan, Musaab Hasan, Andrew Marrington. [doi]
- Lattice-based Multisignature Optimization for RAM Constrained DevicesSara Ricci, Vladyslav Shapoval, Petr Dzurenda, Peter Roenne, Jan Oupický, Lukas Malina. [doi]
- Advancing ESSecA: a step forward in Automated Penetration TestingMassimiliano Rak, Felice Moretta, Daniele Granata. [doi]
- Towards realistic problem-space adversarial attacks against machine learning in network intrusion detectionMarta Catillo, Antonio Pecchia, Antonio Repola, Umberto Villano. [doi]
- Reverse Engineered MiniFS File SystemDmitrii Belimov, Evgenii Vinogradov. [doi]
- Towards Post-Quantum Verifiable CredentialsTim Wood 0003, Keerthi Thomas, Matthew Dean, Swaminathan Kannan, Robert Learney. [doi]
- PAKA: Pseudonymous Authenticated Key Agreement without bilinear cryptographyRaphael Schermann, Simone Bussa, Rainer Urian, Ronald Toegl, Christian Steger. [doi]
- Combinatorial Testing Methods for Reverse Engineering Undocumented CAN Bus FunctionalityChristoph Wech, Reinhard Kugler, Manuel Leithner, Dimitris E. Simos. [doi]
- Evaluating Cyber Security Dashboards for Smart Cities and Buildings: Enhancing User Modeling with LLMsHanning Zhao, Bilhanan Silverajan. [doi]
- Future-proofing Secure V2V Communication against Clogging DoS AttacksHongyu Jin 0001, Zhichao Zhou, Panos Papadimitratos. [doi]
- SBOM Ouverture: What We Need and What We HaveGregorio Dalia, Corrado Aaron Visaggio, Andrea Di Sorbo, Gerardo Canfora. [doi]
- Assessing the Impact of Large Language Models on Cybersecurity Education: A Study of ChatGPT's Influence on Student PerformanceMarc Ohm, Christian Bungartz, Felix Boes, Michael Meier 0001. [doi]
- If It Looks Like a Rootkit and Deceives Like a Rootkit: A Critical Examination of Kernel-Level Anti-Cheat SystemsChristoph Dorner, Lukas Daniel Klausner. [doi]
- Privacy Preserving Release of Mobile Sensor DataRahat Masood, Wing Yan Cheng, Dinusha Vatsalan, Deepak Mishra, Hassan Jameel Asghar, Dali Kaafar. [doi]
- Comparing Hyperbolic Graph Embedding models on Anomaly Detection for CybersecurityMohamed Yacine Touahria Miliani, Souhail Abdelmouaiz Sadat, Mohammed Haddad 0001, Hamida Seba, Karima Amrouche. [doi]
- A Framework for Managing Separation of Duty PoliciesSebastian Groll, Sascha Kern, Ludwig Fuchs, Günther Pernul. [doi]
- Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime ForensicsDamian Puchalski, Marek Pawlicki, Rafal Kozik, Rafal Renk, Michal Choras. [doi]
- Comparison of Multiple Feature Selection Techniques for Machine Learning-Based Detection of IoT AttacksViet-Anh Phan, Jan Jerabek, Lukas Malina. [doi]
- Aligning eIDAS and Trust Over IP: A Mapping ApproachCristian Lepore, Romain Laborde, Jessica Eynard. [doi]
- NERO: Advanced Cybersecurity Awareness Ecosystem for SMEsCharalambos Klitis, Ioannis Makris, Pavlos S. Bouzinis, Dimitrios Christos Asimopoulos, Wissam Mallouli, Kitty Kioskli, Eleni Seralidou, Christos Douligeris, Loizos Christofi. [doi]
- Introducing a Multi-Perspective xAI Tool for Better Model ExplainabilityMarek Pawlicki, Damian Puchalski, Sebastian Szelest, Aleksandra Pawlicka, Rafal Kozik, Michal Choras. [doi]
- Hardware Trust Anchor Authentication for Updatable IoT DevicesDominik Lorych, Christian Plappert. [doi]
- Is Personalization Worth It? Notifying Blogs about a Privacy Issue Resulting from Poorly Implemented Consent BannersTheresa Kriecherbauer, Richard Schwank, Adrian Krauss, Konstantin Neureither, Lian Remme, Melanie Volkamer, Dominik Herrmann. [doi]
- From Code to EM Signals: A Generative Approach to Side Channel Analysis-based Anomaly DetectionKurt A. Vedros, Constantinos Kolias, Daniel Barbará, Robert C. Ivans. [doi]
- Timestamp-based Application Fingerprinting in NTFSMichael Galhuber, Robert Luh. [doi]
- A Technical Exploration of Strategies for Augmented Monitoring and Decision Support in Information WarfareFrida Muñoz Plaza, Inés Hernández San Román, Marco Antonio Sotelo Monge. [doi]
- Provably Secure Communication Protocols for Remote AttestationJohannes Wilson, Mikael Asplund, Niklas Johansson, Felipe Boeira. [doi]
- A Blockchain-based Multi-Factor Honeytoken Dynamic Authentication MechanismVassilis Papaspirou, Ioanna Kantzavelou, Yagmur Yigit, Leandros Maglaras, Sokratis K. Katsikas. [doi]
- RMF: A Risk Measurement Framework for Machine Learning ModelsJan Schröder, Jakub Breier. [doi]
- What Johnny thinks about using two-factor authentication on GitHub: A survey among open-source developersAgata Kruzikova, Jakub Suchanek, Milan Broz, Martin Ukrop, Vashek Matyas. [doi]
- Confidence-Aware Fault TreesAlexander Günther, Sebastian Vollmer, Peter Liggesmeyer. [doi]
- ScaNeF-IoT: Scalable Network Fingerprinting for IoT DeviceTadani Nasser Alyahya, Leonardo Aniello, Vladimiro Sassone. [doi]
- An Analysis of Security Concerns in Transitioning Battery Management Systems from First to Second LifeJulian Blümke, Kevin Mayer, Hans-Joachim Hof. [doi]
- Subjective Logic-based Decentralized Federated Learning for Non-IID DataAgnideven Palanisamy Sundar, Feng Li 0001, Xukai Zou, Tianchong Gao. [doi]
- Are Deepfakes a Game-changer in Digital Images Steganography Leveraging the Cover-Source-Mismatch?Arthur Méreur, Antoine Mallet, Rémi Cogranne. [doi]
- DDS Security+: Enhancing the Data Distribution Service With TPM-based Remote AttestationPaul Georg Wagner, Pascal Birnstill, Jürgen Beyerer. [doi]
- Analyzing Air-traffic Security using GIS-"blur' with Information Flow Control in the IIIfFlorian Kammueller. [doi]
- Modelling the privacy landscape of the Internet of VehiclesRuben Cacciato, Mario Raciti, Sergio Esposito, Giampaolo Bella. [doi]
- GDPR-compliant Video Search and Retrieval System for Surveillance DataAmna Shifa, Rónán Kennedy, Mamoona Naveed Asghar. [doi]
- Individual privacy levels in query-based anonymizationSascha Schiegg, Florian Strohmeier, Armin Gerl, Harald Kosch. [doi]
- Sybil Attack Strikes Again: Denying Content Access in IPFS with a Single ComputerThibault Cholez, Claudia-Lavinia Ignat. [doi]
- Unlocking the Potential of Knowledge Graphs: A Cyber Defense Ontology for a Knowledge Representation and Reasoning SystemJosé María Jorquera Valero, Antonio López-Martínez, Pedro Miguel Sánchez Sánchez, Daniel Navarro-Martínez, Rodrigo Varas López, Javier Ignacio Rojo Lacal, Antonio Lopez Vivar, Marco Antonio Sotelo Monge, Manuel Gil Pérez, Gregorio Martínez Pérez. [doi]
- SoK: Federated Learning based Network Intrusion Detection in 5G: Context, State of the Art and ChallengesSara Chennoufi, Gregory Blanc, Houda Jmila, Christophe Kiennert. [doi]
- On the Effectiveness of Large Language Models for GitHub WorkflowsXinyu Zhang, Siddharth Muralee, Sourag Cherupattamoolayil, Aravind Machiry. [doi]
- From Seaweed to Security: Harnessing Alginate to Challenge IoT Fingerprint AuthenticationPouria Rad, Gokila Dorai, Mohsen M. Jozani. [doi]
- Open V2X Management Platform Cyber-Resilience and Data Privacy MechanismsAlexios Lekidis, Hugo Morais. [doi]
- PQ-REACT: Post Quantum Cryptography Framework for Energy Aware ContextsMarta Irene García Cid, Michail-Alexandros Kourtis, David Domingo Martín, Nikolay Tcholtchev, Evangelos K. Markakis, Marcin Niemiec, Javier Faba, Laura Ortiz, Vicente Martín, Diego R. López, George Xilouris, Maria Gagliardi, José González, Miguel García, Giovanni Comandé, Nikolai Stoianov. [doi]
- SoK: A Taxonomy for Hardware-Based Fingerprinting in the Internet of ThingsChristian Spinnler, Torsten Labs, Norman Franchi. [doi]
- Manipulating the Swap Memory for Forensic InvestigationMaximilian Olbort, Daniel Spiekermann, Jörg Keller 0001. [doi]
- Enhancing Network Security Through Granular Computing: A Clustering-by-Time Approach to NetFlow Traffic AnalysisMikolaj Komisarek, Marek Pawlicki, Salvatore D'Antonio, Rafal Kozik, Aleksandra Pawlicka, Michal Choras. [doi]
- DECEPTWIN: Proactive Security Approach for IoV by Leveraging Deception-based Digital Twins and BlockchainMubashar Iqbal 0001, Sabah Suhail, Raimundas Matulevicius. [doi]
- Unveiling Vulnerabilities in Bitcoin's Misbehavior-Score Mechanism: Attack and DefenseYuwen Zou, Wenjun Fan, Zhen Ma. [doi]
- AI-Powered Penetration Testing using Shennina: From Simulation to ValidationStylianos Karagiannis, Camilla Fusco, Leonidas Agathos, Wissam Mallouli, Valentina Casola, Christoforos Ntantogian, Emmanouil Magkos. [doi]
- Create, Read, Update, Delete: Implications on Security and Privacy Principles regarding GDPRMichail Pantelelis, Christos Kalloniatis. [doi]
- Proxy Re-Encryption for Enhanced Data Security in Healthcare: A Practical ImplementationSaber Mhiri, Alfonso Egio, Maxime Compastié, Pablo Cosio. [doi]
- SECURA: Unified Reference Architecture for Advanced Security and Trust in Safety Critical InfrastructuresMichael Eckel, Sigrid Gürgens. [doi]