Abstract is missing.
- Bitcoin adoption: Scams and anonymity may not matter but trust into Bitcoin security doesAleksander Murko, Simon L. R. Vrhovec. [doi]
- Security in Process: Detecting Attacks in Industrial Process DataSimon D. Duque Antón, Anna Pia Lohfink, Christoph Garth, Hans Dieter Schotten. [doi]
- Retrospective Tracking of Suspects in GDPR Conform Mobile Access Networks DatasetsLouis Tajan, Dirk Westhoff. [doi]
- Cybercrime victimization and seeking help: A survey of students in SloveniaKaja Prislan, Igor Bernik, Gorazd Mesko, Rok Hacin, Blaz Markelj, Simon L. R. Vrhovec. [doi]
- Forensic Investigations in Vehicle Data StoresNico Vinzenz, Tobias Eggendorfer. [doi]
- Approaching the Automation of Cyber Security Testing of Connected VehiclesStefan Marksteiner, Zhendong Ma. [doi]
- Determining Minimum Hash Width for Hash ChainsMartin Dietzfelbinger, Jörg Keller. [doi]
- IPv6 Covert Channels in the WildWojciech Mazurczyk, Krystian Powójski, Luca Caviglione. [doi]
- SAT Solvers and their Limits with NFSR-based Stream Ciphers: an Example with Grain v1Andreas Schaffhauser. [doi]
- Discussing the Feasibility of Acoustic Sensors for Side Channel-aided Industrial Intrusion Detection: An EssaySimon D. Duque Antón, Anna Pia Lohfink, Hans Dieter Schotten. [doi]
- Integrating Threat Modeling and Automated Test Case Generation into Industrialized Software Security TestingStefan Marksteiner, Rudolf Ramler, Hannes Sochor. [doi]
- Digital Forensics vs. Due Process: Conflicting Standards or Complementary Approaches?Uwe Ewald. [doi]
- A Secure String Class Compliant with PCI DSSKatarína Amrichová, Terézia Mézesová. [doi]
- Simulating and Detecting Attacks of Untrusted Clients in OPC UA NetworksCharles Varlei Neu, Ina Schiering, Avelino F. Zorzo. [doi]
- The Password Literacy in North Macedonia: A Case StudyAndrej Cvetkovski, Flavio Esposito. [doi]
- Multi-Platform Authorship VerificationAbdulaziz Altamimi, Nathan L. Clarke, Steven Furnell, Fudong Li. [doi]
- From Fake News to Virtual Reality: Fake News and Digital Manipulations at the Age of Modern TechnologyTal Pavel. [doi]
- On the Feasibility of Secure Logging for Industrial Control Systems Using BlockchainStefan Schorradt, Edita Bajramovic, Felix C. Freiling. [doi]
- Case Study: Analysis and Mitigation of a Novel Sandbox-Evasion TechniqueZiya Alper Genç, Gabriele Lenzini, Daniele Sgandurra. [doi]
- Combined side-channels malware detection for NFV infrastructureAndrew Sergeev, Eyal Ben-Sa'adon, Elad Tannenbaum, Asi Saar. [doi]
- A practical view on IT risk management processMaksim Goman. [doi]
- Meizodon: Security Benchmarking Framework for Static Android Malware DetectorsSebastiaan Alvarez Rodriguez, Erik van der Kouwe. [doi]
- Obfuscated Android Application DevelopmentPierre Graux, Jean-François Lalande, Valérie Viet Triem Tong. [doi]
- How much does a zero-permission Android app know about us?Antonios Dimitriadis, George Drosatos, Pavlos S. Efraimidis. [doi]
- Towards a delegation-type secure software development methodAnze Mihelic, Tomaz Hovelja, Simon L. R. Vrhovec. [doi]
- Accommodating Time-Triggered Authentication to FlexRay DemandsPal-Stefan Murvay, Lucian Popa 0003, Bogdan Groza. [doi]
- Achieving Consistency of Software Updates against Strong AttackersLamya Abdullah, Sebastian Hahn, Felix C. Freiling. [doi]
- Network Forensic Investigation in OpenContrail EnvironmentsAlexander Heckel, Daniel Spiekermann. [doi]