Abstract is missing.
- Anomaly based Resilient Network Intrusion Detection using Inferential AutoencodersAbdul Hannan, Christian Gruhl, Bernhard Sick. 1-7 [doi]
- Act Proactively: An Intrusion Prediction Approach for Cyber SecurityPanagiotis Panagiotidis, Christos Angelidis, Ioannis Karalis, George Spyropoulos, Angelos Liapis. 8-13 [doi]
- A Stream Clustering Algorithm for Classifying Network IDS AlertsRisto Vaarandi. 14-19 [doi]
- Statistical Metamorphic Testing of Neural Network Based Intrusion Detection SystemsFaqeer ur Rehman, Clemente Izurieta. 20-26 [doi]
- Detecting SQL Injection Web Attacks Using Ensemble Learners and Data SamplingRichard Zuech, John T. Hancock, Taghi M. Khoshgoftaar. 27-34 [doi]
- SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernelThomas Cochrane, Peter Foster, Varun Chhabra, Maud Lemercier, Terry J. Lyons, Cristopher Salvi. 35-40 [doi]
- Software Vulnerabilities, Products and Exploits: A Statistical Relational Learning ApproachCainã Figueiredo, João Gabriel Lopes, Rodrigo Azevedo Santos, Gerson Zaverucha, Daniel Sadoc Menasché, Leandro Pfleger de Aguiar. 41-46 [doi]
- Rapid Ransomware Detection through Side Channel ExploitationMichael A. Taylor 0001, Eric C. Larson, Mitchell A. Thornton. 47-54 [doi]
- Machine learning on knowledge graphs for context-aware security monitoringJosep Soler Garrido, Dominik Dold, Johannes Frank. 55-60 [doi]
- Mc-PUF: Memory-based and Machine Learning Resilient Strong PUF for Device Authentication in Internet of ThingsPhillip Williams, Haytham Idriss, Magdy A. Bayoumi. 61-65 [doi]
- SoK: Autonomic Cybersecurity - Securing Future Disruptive TechnologiesChristopher A. Rouff, Lanier Watkins, Roy Sterritt, Salim Hariri. 66-72 [doi]
- ERAMO: Effective Remote Attestation through Memory OffloadingJeppe Hagelskjær Østergaard, Edlira Dushku, Nicola Dragoni. 73-80 [doi]
- ENAD: An Ensemble Framework for Unsupervised Network Anomaly DetectionJingyi Liao, Sin G. Teo, Partha Pratim Kundu, Tram Truong Huu. 81-88 [doi]
- Using Deep Packet Inspection in CyberTraffic AnalysisLuca Deri, Francesco Fusco. 89-94 [doi]
- Clustering Analysis of Email Malware CampaignsRuichao Zhang, Shang Wang, Renée Burton, Minh Hoang, Juhua Hu, Anderson C. A. Nascimento. 95-102 [doi]
- Enhancing Medical Data Security on Public CloudNelson Santos, Waleed Younis, Bogdan V. Ghita, Giovanni Luca Masala. 103-108 [doi]
- On Security of Key Derivation Functions in Password-based CryptographyGaurav Kodwani, Shashank Arora, Pradeep K. Atrey. 109-114 [doi]
- Web Bot Detection Evasion Using Generative Adversarial NetworksChristos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Ioannis Kompatsiaris. 115-120 [doi]
- Understanding and Mitigating Banking Trojans: From Zeus to EmotetKonstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Costas Vassilakis, Stavros Shiaeles. 121-128 [doi]
- Insider Threat Detection using Deep Autoencoder and Variational Autoencoder Neural NetworksEfthimios Pantelidis, Gueltoum Bendiab, Stavros Shiaeles, Nicholas Kolokotronis. 129-134 [doi]
- Toward Automated Threat Modeling of Edge Computing SystemsValentina Casola, Alessandra De Benedictis, Carlo Mazzocca, Rebecca Montanari. 135-140 [doi]
- Semi-Automatic Bug Generation Using Test Case NegationTyler Westland, Nan Niu, Rashmi Jha, David Kapp, Temesguen Kebede. 141-146 [doi]
- STRIDE-AI: An Approach to Identifying Vulnerabilities of Machine Learning AssetsLara Mauri, Ernesto Damiani. 147-154 [doi]
- Resilient BootSergey Ostrikov. 155-159 [doi]
- Cyber Resilience for Self-Monitoring IoT DevicesMarcel Medwed, Ventzislav Nikov, Joost Renes, Tobias Schneider 0002, Nikita Veshchikov. 160-167 [doi]
- Resilience learning through self adaptation in digital twins of human-cyber-physical systemsEmanuele Bellini 0001, Franco Bagnoli, Mauro Caporuscio, Ernesto Damiani, Francesco Flammini, Igor Linkov, Pietro Liò, Stefano Marrone 0001. 168-173 [doi]
- Automated and On-Demand Cybersecurity CertificationStylianos Karagiannis, Marco Manso, Emmanouil Magkos, Luís L. Ribeiro, Luís Campos. 174-179 [doi]
- Towards a Maritime Cyber Range training environmentGeorgios Potamos, Adamantini Peratikou, Stavros Stavrou. 180-185 [doi]
- Cyber-Range Federation and Cyber-Security Games: A Gamification Scoring ModelJason Diakoumakos, Evangelos Chaskos, Nicholas Kolokotronis, George Lepouras. 186-191 [doi]
- Cyber-Security Training Evaluation MetricsNikolaos Koutsouris, Costas Vassilakis, Nicholas Kolokotronis. 192-197 [doi]
- Open Source and Commercial Capture The Flag Cyber Security Learning Platforms - A Case StudyMatthew Swann, Joseph R. Rose, Gueltoum Bendiab, Stavros Shiaeles, Fudong Li. 198-205 [doi]
- Development of a Testbed for Fully Homomorphic Encryption SolutionsStefano Marrone 0001, Antonio Tortora, Emanuele Bellini 0001, Antonella Maione, Mariapia Raimondo. 206-211 [doi]
- Towards anomaly detection in smart grids by combining Complex Events Processing and SNMP objectsMassimiliano Leone Itria, Enrico Schiavone, Nicola Nostro. 212-217 [doi]
- Reinforcement Learning-driven Attack on Road Traffic Signal ControllersNajmeh Seifollahpour Arabi, Talal Halabi, Mohammad Zulkernine. 218-225 [doi]
- SoK: Investigation of Security and Functional Safety in Industrial IoTEmrah Tomur, Utku Gülen, Elif Ustundag Soykan, Mehmet Akif Ersoy, Ferhat Karakoç, Leyli Karaçay, Pinar Çomak. 226-233 [doi]
- Enabling Efficient Common Criteria Security Evaluation for Connected VehiclesAngelos Stamou, Panagiotis Pantazopoulos, Sammy Haddad, Angelos Amditis. 234-240 [doi]
- Analyzing Cascading Effects of Spoofing Attacks on ADS-B Using a Discrete Model of Air Traffic Control Responses and AGMOD DynamicsMohd Ruzeiny Bin Kamaruzzaman, Bernard Ousmane Sané, Doudou Fall, Yuzo Taenaka, Youki Kadobayashi. 241-248 [doi]
- Towards HybridgeCAN, a hybrid bridged CAN platform for automotive security testingDaniele Granata, Massimiliano Rak, Giovanni Salzillo. 249-254 [doi]
- Securing an MQTT-based Traffic Light Perception System for Autonomous DrivingAbasi-Amefon O. Affia, Raimundas Matulevicius. 255-260 [doi]
- Secure Communication in Smart Meters using Elliptic Curve Cryptography and Digital Signature AlgorithmSaurabh Shukla, Subhasis Thakur, John G. Breslin. 261-266 [doi]
- Real-time, Simulation-based Identification of Cyber-Security Attacks of Industrial PlantsAbhi Patel, Tim Schenk, Steffi Knorn, Heiko Patzlaff, Dragan Obradovic, Andrés Botero Halblaub. 267-272 [doi]
- Fast Dual-Field ECDSA Accelerator with Increased Resistance against Horizontal SCA AttacksIevgen Kabin, Dan Klann, Zoya Dyka, Peter Langendoerfer. 273-280 [doi]
- On the detection of Channel Switch Announcement Attack in 802.11 networksConstantinos Louca, Adamantini Peratikou, Stavros Stavrou. 281-285 [doi]
- A Dynamic Reconfiguration-based Approach to Resilient State EstimationAnnie Joss, Austin Grassbaugh, Majid Poshtan, Joseph Callenes. 286-291 [doi]
- Systematic and Efficient Anomaly Detection Framework using Machine Learning on Public ICS DatasetsBaptiste Millot, Julien Francq, Franck Sicard. 292-297 [doi]
- Machine Learning for Threat Recognition in Critical Cyber-Physical SystemsPaola Perrone, Francesco Flammini, Roberto Setola. 298-303 [doi]
- Mapping Cyber Threat Intelligence to Probabilistic Attack GraphsAndreas Gylling, Mathias Ekstedt, Zeeshan Afzal, Per Eliasson. 304-311 [doi]
- A tree-based machine learning methodology to automatically classify software vulnerabilitiesGeorgios Aivatoglou, Mike Anastasiadis, Georgios Spanos, Antonis Voulgaridis, Konstantinos Votis, Dimitrios Tzovaras. 312-317 [doi]
- Evaluation and Enhancement of the Actionability of Publicly Available Cyber Threat Information in Digital ForensicsAthanasios Dimitriadis, Efstratios Lontzetidis, Ioannis Mavridis. 318-323 [doi]
- A workflow and toolchain proposal for analyzing users' perceptions in cyber threat intelligence sharing platformsBorce Stojkovski, Gabriele Lenzini. 324-330 [doi]
- CTI Blockchain-Based Sharing using Proof-of-Quality Consensus AlgorithmDimitrios Chatziamanetoglou, Konstantinos Rantos. 331-336 [doi]
- Towards Intrusion Response IntelKieran Hughes, Kieran McLaughlin, Sakir Sezer. 337-342 [doi]
- Data Sanitisation and Redaction for Cyber Threat Intelligence Sharing PlatformsCagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, Deniz Cetinkaya, Jane Henriksen-Bulmer, Alice Cooper. 343-347 [doi]
- Named Entity Recognition in Cyber Threat Intelligence Using Transformer-based ModelsPavlos Evangelatos, Christos Iliou, Thanassis Mavropoulos, Konstantinos Apostolou, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris. 348-353 [doi]
- Towards Selecting Informative Content for Cyber Threat IntelligencePanos Panagiotou, Christos Iliou, Konstantinos Apostolou, Theodora Tsikrika, Stefanos Vrochidis, Periklis Chatzimisios, Ioannis Kompatsiaris. 354-359 [doi]
- Trust and Quality Computation for Cyber Threat Intelligence Sharing PlatformsKadir Burak Mavzer, Ewa Konieczna, Henrique Alves, Cagatay Yucel, Ioannis Chalkias, Dimitrios Mallis, Deniz Cetinkaya, Luis Angel Galindo Sánchez. 360-365 [doi]
- Towards Automated Matching of Cyber Threat Intelligence Reports based on Cluster Analysis in an Internet-of-Vehicles EnvironmentGeorge E. Raptis, Christina P. Katsini, Christos Alexakos. 366-371 [doi]
- Modelling Cyber-Risk in an Economic PerspectiveIoannis Bothos, Vasileios Vlachos, Dimitris M. Kyriazanos, Ioannis Stamatiou, Konstantinos Giorgios Thanos, Pantelis Tzamalis, Sotirios E. Nikoletseas, Stelios C. A. Thomopoulos. 372-377 [doi]
- Disposable identities; enabling trust-by-design to build more sustainable data driven valueJari Isohanni, Lorna Goulden, Kai M. Hermsen, Mirko Ross, Jef Vanbockryck. 378-383 [doi]
- Influence Pathways: Mapping the Narratives and Psychological Effects of Russian COVID-19 DisinformationAiden Hoyle, Thomas Powell, Beatrice Cadet, Judith van de Kuijt. 384-389 [doi]
- The Current State of The Art and Future of European Cyber Range EcosystemCsaba Virág, Jakub Cegan, Tomás Lieskovan, Matteo Merialdo. 390-395 [doi]
- Frankenstack: Real-time Cyberattack Detection and Feedback System for Technical Cyber ExercisesMauno Pihelgas, Markus Kont. 396-402 [doi]
- ECHO Federated Cyber Range: Towards Next-Generation Scalable Cyber RangesNikos Oikonomou, Notis Mengidis, Minas Spanopoulos-Karalexidis, Antonis Voulgaridis, Matteo Merialdo, Ivo Raisr, Kaarel Hanson, Paloma de La Vallee, Theodora Tsikrika, Stefanos Vrochidis, Konstantinos Votis. 403-408 [doi]
- The Cyber-MAR Project: First Results and Perspectives on the Use of Hybrid Cyber Ranges for Port Cyber Risk AssessmentOlivier Jacq, Pablo Giménez Salazar, Kamban Parasuraman, Jarkko Kuusijärvi, Andriana Gkaniatsou, Evangelia Latsa, Angelos Amditis. 409-414 [doi]
- The SPIDER Cyber Security Investment Component (CIC)Maria Tsiodra, Michail Chronopoulos, Matthias Ghering, Eirini Karapistoli, Neofytos Gerosavva, Nicolas Kylilis. 415-421 [doi]
- The THREAT-ARREST Cyber Range PlatformGeorge Hatzivasilis, Sotiris Ioannidis, Michail Smyrlis, George Spanoudakis, Fulvio Frati, Chiara Braghin, Ernesto Damiani, Hristo Koshutanski, George Tsakirakis, Torsten Hildebrandt, Ludger Goeke, Sebastian Pape 0001, Oleg Blinder, Michael Vinov, George Leftheriotis, Martin Kunc, Fotis Oikonomou, Giovanni Magilo, Vito Petrarolo, Antonio Chieti, Robert Bordianu. 422-427 [doi]
- Cyber Security Certification ProgrammesEleni-Constantina Davri, Eleni Darra, Isidoros Monogioudis, Athanasios Grigoriadis, Christos Iliou, Notis Mengidis, Theodora Tsikrika, Stefanos Vrochidis, Adamantini Peratikou, Helen Gibson, Damir Haskovic, Dimitrios Kavallieros, Evangelos Chaskos, Peng Zhao, Stavros Shiaeles, Nick Savage, Babak Akhgar, Xavier J. A. Bellekens, Mohamed Amine Ben Farah. 428-435 [doi]
- Social Media Monitoring for IoT Cyber-ThreatsSofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou. 436-441 [doi]
- Data Exfiltration: Methods and Detection CountermeasuresJames King, Gueltoum Bendiab, Nick Savage, Stavros Shiaeles. 442-447 [doi]
- Detecting Adversarial DDoS Attacks in Software- Defined Networking Using Deep Learning Techniques and Adversarial TrainingBeny Nugraha, Naina Kulkarni, Akash Gopikrishnan. 448-454 [doi]
- Unveiling MIMETIC: Interpreting Deep Learning Traffic Classifiers via XAI TechniquesAlfredo Nascita, Antonio Montieri, Giuseppe Aceto, Domenico Ciuonzo, Valerio Persico, Antonio Pescapè. 455-460 [doi]
- Detecting Attacks on IoT Devices using Featureless 1D-CNNArshiya Khan, Chase Cotton. 461-466 [doi]
- DAHID: Domain Adaptive Host-based Intrusion DetectionOluwagbemiga Ajayi, Aryya Gangopadhyay. 467-472 [doi]
- Enhancing SIEM Technology for protecting Electrical Power and Energy SectorIosif Sklavidis, Christos Angelidis, Rosanna Babagiannou, Angelos Liapis. 473-478 [doi]
- A Scalable Multi-Agent System for Black Start Restoration in Low Voltage MicrogridsAchilleas Pasias, Alexandros Schoinas, Anastasios Drosou, Dimitrios Tzovaras. 479-484 [doi]
- TRUSTY: A Solution for Threat Hunting Using Data Analysis in Critical InfrastructuresPanagiotis I. Radoglou-Grammatikis, Athanasios Liatifis, Elisavet Grigoriou, Theocharis Saoulidis, Antonios G. G. Sarigiannidis, Thomas Lagkas, Panagiotis Sarigiannidis. 485-490 [doi]
- Increasing resilience of power systems using intentional islanding; a comparison of Binary genetic algorithm and deep learning based methodPol Paradell, Yannis Spyridis, Alba Colet, Anzhelika Ivanova, José Luis Domínguez-García, Achilleas Sesis, Georgios Efstathopoulos. 491-496 [doi]
- Enabling Cyber-attack Mitigation Techniques in a Software Defined NetworkAchilleas Pasias, Thanasis Kotsiopoulos, Georgios Lazaridis, Anastasios Drosou, Dimitrios Tzovaras, Panagiotis Sarigiannidis. 497-502 [doi]
- Advancing the State of Maritime Cybersecurity Guidelines to Improve the Resilience of the Maritime Transportation SystemLogan Drazovich, Liam Brew, Susanne Wetzel. 503-509 [doi]
- The Impact of COVID-19 on the Security and Resilience of the Maritime Transportation SystemLiam Brew, Logan Drazovich, Susanne Wetzel. 510-517 [doi]
- Impact assessment of anomaly propagation in a naval water distribution cyber-physical systemNicolas Pelissero, Pedro Merino Laso, John Puentes. 518-523 [doi]
- A Backwards Compatible Approach to Authenticate Automatic Identification System MessagesMalte Christian Struck, Jannis Stoppe. 524-529 [doi]
- Quantum Cryptography in Maritime TelecommunicationsMaria Papathanasaki, Panagiotis Fountas, Leandros A. Maglaras, Christos Douligeris, Mohamed Amine Ferrag. 530-535 [doi]
- Towards Resilient Artificial Intelligence: Survey and Research IssuesOliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo. 536-542 [doi]
- Assessing adversarial training effect on IDSs and GANsHassan Chaitou, Thomas Robert 0003, Jean Leneutre, Laurent Pautet. 543-550 [doi]
- Defending Against Model Inversion Attack by Adversarial ExamplesJing Wen, Siu-Ming Yiu, Lucas C. K. Hui. 551-556 [doi]
- X-BaD: A Flexible Tool for Explanation-Based Bias DetectionMarco Pacini, Federico Nesti, Alessandro Biondi, Giorgio Buttazzo. 557-562 [doi]
- Improving Classification Trustworthiness in Random ForestsMaria Stella De Biase, Fiammetta Marulli, Laura Verde, Stefano Marrone 0001. 563-568 [doi]