Abstract is missing.
- Attacking with Bitcoin: Using Bitcoin to Build Resilient Botnet ArmiesDimitri Kamenski, Arash Shaghaghi, Matthew J. Warren, Salil S. Kanhere. 3-12 [doi]
- Blockchain-Based Systems in Land Registry, A Survey of Their Use and Economic ImplicationsYeray Mezquita Martín, Javier Parra, Eugenia Pérez, Javier Prieto, Juan Manuel Corchado. 13-22 [doi]
- The Evolution of Privacy in the Blockchain: A Historical SurveySergio Marciante, Álvaro Herrero. 23-34 [doi]
- Securing Cryptoasset Insurance Services with MultisignaturesDaniel Wilusz, Adam Wójtowicz. 35-44 [doi]
- Building an Ethereum-Based Decentralized Vehicle Rental SystemNéstor García-Moreno, Pino Caballero-Gil, Cándido Caballero-Gil, Jezabel Molina-Gil. 45-53 [doi]
- Off-Line Writer Verification Using Segments of Handwritten Samples and SVMVerónica Aubin, Matilde Santos, Marco Mora. 57-65 [doi]
- A Comparative Study to Detect Flowmeter Deviations Using One-Class ClassifiersEsteban Jove, José Luís Casteleiro-Roca, Héctor Quintián, Francisco Zayas-Gato, Paulo Novais, Juan Albino Méndez Pérez, José Luís Calvo-Rolle. 66-75 [doi]
- IoT Device Identification Using Deep LearningJaidip Kotak, Yuval Elovici. 76-86 [doi]
- Impact of Current Phishing Strategies in Machine Learning Models for Phishing DetectionM. Sánchez-Paniagua, Eduardo Fidalgo, Víctor González-Castro, Enrique Alegre. 87-96 [doi]
- Crime Prediction for Patrol Routes Generation Using Machine LearningCésar Guevara, Matilde Santos. 97-107 [doi]
- Health Access Broker: Secure, Patient-Controlled Management of Personal Health Records in the CloudZainab Abaid, Arash Shaghaghi, Ravin Gunawardena, Suranga Seneviratne, Aruna Seneviratne, Sanjay Jha 0001. 111-121 [doi]
- Short Message Multichannel Broadcast EncryptionJosé Luis Salazar, Jose Saldana, Julián Fernández-Navajas, José Ruíz-Mas, Guillermo Azuara. 122-131 [doi]
- Cybersecurity Overview of a Robot as a Service PlatformLaura Fernández-Becerra, David Fernández González, Ángel Manuel Guerrero Higueras, Francisco Javier Rodríguez Lera, Camino Fernández Llamas. 132-141 [doi]
- Probabilistic and Timed Analysis of Security ProtocolsOlga Siedlecka-Lamch. 142-151 [doi]
- Domain Knowledge: Predicting the Kind of Content Hosted by a DomainSuriyan Laohaprapanon, Gaurav Sood. 152-162 [doi]
- Evidence Identification and Acquisition Based on Network Link in an Internet of Things EnvironmentSaad Khalid Alabdulsalam, Trung Q. Duong, Kim-Kwang Raymond Choo, Nhien-An Le-Khac. 163-173 [doi]
- Proposition of Innovative and Scalable Information System for Call Detail Records Analysis and VisualisationRafal Kozik, Michal Choras, Marek Pawlicki, Aleksandra Pawlicka, Wojciech Warczak, Grzegorz Mazgaj. 174-183 [doi]
- Automatic Detection of Sensitive Information in Educative Social NetworksVíctor Botti-Cebriá, Elena del Val, Ana García-Fornes. 184-194 [doi]
- Detection of Artificial Images and Changes in Real Images Using Convolutional Neural NetworksMariusz Kubanek, Kamila Bartlomiejczyk, Janusz Bobulski. 197-207 [doi]
- Distributed Architecture for Fake News DetectionRafal Kozik, Michal Choras, Sebastian Kula, Marek Pawlicki. 208-217 [doi]
- Multi-stage News-Stance Classification Based on Lexical and Neural FeaturesFuad Mire Hassan, Mark Lee. 218-228 [doi]
- Fake News Detection - Do Complex Problems Need Complex Solutions?Ignacio Palacio Marín, David Arroyo. 229-238 [doi]
- Application of the BERT-Based Architecture in Fake News DetectionSebastian Kula, Michal Choras, Rafal Kozik. 239-249 [doi]
- Simulating Malware Propagation with Different Infection RatesJose Diamantino Hernández Guillén, Ángel Martín del Rey. 253-262 [doi]
- A Data Quality Assessment Model and Its Application to Cybersecurity Data SourcesNoemí DeCastro-García, Enrique Pinto. 263-272 [doi]
- Towards Forecasting Time-Series of Cyber-Security Data AggregatesMiguel V. Carriegos, Ramón Ángel Fernández Díaz. 273-281 [doi]
- Hybrid Approximate Convex Hull One-Class Classifier for an Industrial PlantIago Núñez, Esteban Jove, José Luís Casteleiro-Roca, Héctor Quintián, Francisco Zayas-Gato, Dragan Simic, José Luís Calvo-Rolle. 282-292 [doi]
- Traceability and Accountability in Autonomous AgentsFrancisco Javier Rodríguez Lera, Miguel Ángel González Santamarta, Ángel Manuel Guerrero, Francisco Martí-n, Vicente Matellán. 295-305 [doi]
- The Order of the Factors DOES Alter the Product: Cyber Resilience Policies' Implementation OrderJuan Francisco Carias, Marcos R. S. Borges, Leire Labaka, Saioa Arrizabalaga, Josune Hernantes. 306-315 [doi]
- Deep Learning Defenses Against Adversarial Examples for Dynamic Risk AssessmentXabier Echeberria-Barrio, Amaia Gil-Lerchundi, Ines Goicoechea-Telleria, Raul Orduna Urrutia. 316-326 [doi]
- A New Approach for Dynamic and Risk-Based Data AnonymizationLilian Adkinson-Orellana, Pablo Dago-Casas, Marta Sestelo, Borja Pintos Castro. 327-336 [doi]
- An Innovative Linear Complexity Computation for Cryptographic SequencesJose Luis Martin-Navarro, Amparo Fúster-Sabater, Sara D. Cardell. 339-349 [doi]
- Randomness Analysis for GSS-sequences ConcatenatedSara Díaz Cardell, Amparo Fúster-Sabater, Amalia Beatriz Orúe López, Verónica Requena. 350-360 [doi]
- Study of the Reconciliation Mechanism of NewHopeVictor Gayoso Martínez, Luis Hernández Encinas, Agustín Martín Muñoz. 361-370 [doi]
- Securing Blockchain with Quantum Safe Cryptography: When and How?Veronica Fernandez, Amalia Beatriz Orúe López, David Arroyo. 371-379 [doi]
- Blockchain in Education: New ChallengesWilson Rojas, Victor Gayoso Martínez, Araceli Queiruga Dios. 380-389 [doi]
- Impact of Generative Adversarial Networks on NetFlow-Based Traffic ClassificationMaximilian Wolf, Markus Ring, Dieter Landes. 393-404 [doi]
- Hybrid Model for Improving the Classification Effectiveness of Network Intrusion DetectionVibekananda Dutta, Michal Choras, Rafal Kozik, Marek Pawlicki. 405-414 [doi]
- Adaptive Approach for Density-Approximating Neural Network Models for Anomaly DetectionMartin Flusser, Petr Somol. 415-425 [doi]
- Systematic Mapping of Detection Techniques for Advanced Persistent ThreatsDavid Sobrín-Hidalgo, Adrián Campazas Vega, Ángel Manuel Guerrero Higueras, Francisco Javier Rodríguez Lera, Camino Fernández Llamas. 426-435 [doi]
- Neural Network Analysis of PLC Traffic in Smart City Street Lighting NetworkTomasz Andrysiak, Lukasz Saganowski. 436-445 [doi]
- Beta-Hebbian Learning for Visualizing Intrusions in FlowsHéctor Quintián, Esteban Jove, José Luís Casteleiro-Roca, Daniel Urda, Ángel Arroyo, José Luís Calvo-Rolle, Álvaro Herrero, Emilio Corchado. 446-459 [doi]
- Detecting Intrusion via Insider Attack in Database Transactions by Learning Disentangled Representation with Deep Metric Neural NetworkGwang-Myong Go, Seok-Jun Bu, Sung-Bae Cho. 460-469 [doi]