Abstract is missing.
- Context Correlation for Automated Dynamic Android App Analysis to Improve Impact Rating of Privacy and Security FlawsKris Heid, Jens Heider. 1-17 [doi]
- Errors in the CICIDS2017 Dataset and the Significant Differences in Detection Performances It MakesMaxime Lanvin, Pierre-François Gimenez, Yufei Han, Frédéric Majorczyk, Ludovic Mé, Eric Totel. 18-33 [doi]
- A Comparative Study of Attribute Selection Algorithms on Intrusion Detection System in UAVs: A Case Study of UKM-IDS20 DatasetAhmed Burhan Mohammed, Lamia Chaari Fourati, Ahmed Fakhrudeen. 34-46 [doi]
- PRIAH: Private Alerts in HealthcareAbdel Mlak Said, Aymen Yahyaoui, Takoua Abdellatif. 47-61 [doi]
- Tool Paper - SEMA: Symbolic Execution Toolchain for Malware AnalysisCharles-Henry Bertrand Van Ouytsel, Christophe Crochet, Khanh-Huu-The Dam, Axel Legay. 62-68 [doi]
- Blockchain Survey for Security and Privacy in the e-Health EcosystemMaher Boughdiri, Takoua Abdellatif, Tesnim Abdellatif. 69-84 [doi]
- Towards a Dynamic Testing Approach for Checking the Correctness of Ethereum Smart ContractsMohamed Amin Hammami, Mariam Lahami, Afef Jmal Maâlej. 85-100 [doi]
- Blockchain Olive Oil Supply ChainTarek Frikha, Jalel Ktari, Habib Hamam. 101-113 [doi]
- Impact of EIP-1559 on Transactions in the Ethereum Blockchain and Its RollupsSalah Gontara, Amine Boufaied, Ouajdi Korbaa. 114-126 [doi]
- Towards a Secure Cross-Blockchain Smart Contract ArchitectureRawya Mars, Saoussen Cheikhrouhou, Slim Kallel, Mohamed Sellami, Ahmed Hadj Kacem. 127-132 [doi]
- Security Analysis: From Model to System AnalysisBastien Drouot, Valery Monthe, Sylvain Guérin, Joël Champeau. 133-152 [doi]
- Modeling Train Systems: From High-Level Architecture Graphical Models to Formal SpecificationsRacem Bougacha, Régine Laleau, Philippe Bon, Simon Collart Dutilleul, Rahma Ben Ayed. 153-168 [doi]
- How IT Infrastructures Break: Better Modeling for Better Risk ManagementBenjamin Somers, Fabien Dagnat, Jean-Christophe Bach. 169-184 [doi]
- IoT Security Within Small and Medium-Sized Manufacturing CompaniesJohannes Beckert, Teo Blazevic, Alexander Dobhan. 185-190 [doi]
- An Incentive Mechanism for Managing Obligation DelegationLiang Chen, Cheng Zeng, Stilianos Vidalis. 191-206 [doi]
- Virtual Private Network Blockchain-based Dynamic Access Control Solution for Inter-organisational Large Scale IoT NetworksRahma Trabelsi, Ghofrane Fersi, Mohamed Jmaiel. 207-222 [doi]
- Pseudonym Swapping with Secure Accumulators and Double Diffie-Hellman Rounds in Cooperative Intelligent Transport SystemsHannes Salin. 223-238 [doi]
- Benchmark Performance of the Multivariate Polynomial Public Key Encapsulation MechanismRandy Kuang, Maria Perepechaenko, Ryan Toth, Michel Barbeau. 239-255 [doi]