Abstract is missing.
- Flood Control: TCP-SYN Flood Detection for Software-Defined Networks using OpenFlow Port StatisticsTapadhir Das, Osama Abu Hamdan, Shamik Sengupta, Engin Arslan. 1-8 [doi]
- A Stable Generative Adversarial Network Architecture for Network Intrusion DetectionRaha Soleymanzadeh, Rasha F. Kashef. 9-15 [doi]
- LSTM-Based Anomalous Behavior Detection in Multi-Agent Reinforcement LearningCameron Lischke, Tongtong Liu, Joe McCalmon, Md Asifur Rahman, Talal Halabi, Sarra Alqahtani. 16-21 [doi]
- H4rm0ny: A Competitive Zero-Sum Two-Player Markov Game for Multi-Agent Learning on Evasive Malware Generation and DetectionChristopher Molloy, Steven H. H. Ding, Benjamin C. M. Fung, Philippe Charland. 22-29 [doi]
- Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in ContainersAlfonso Iacovazzi, Shahid Raza. 30-37 [doi]
- On Usability of Hash Fingerprinting for Endpoint Application IdentificationJenny Heino, Ayush Gupta, Antti Hakkala, Seppo Virtanen. 38-43 [doi]
- Data Volume Reduction for Deep Packet Inspection by Multi-layer Application DeterminationMichael Vogel, Franka Schuster, Fabian Malte Kopp, Hartmut König. 44-49 [doi]
- Host-based Cyber Attack Pattern Identification on Honeypot Logs Using Association Rule LearningAngelos Papoutsis, Christos Iliou, Dimitris Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris. 50-55 [doi]
- Using CyberScore for Network Traffic MonitoringLuca Deri, Alfredo Cardigliano. 56-61 [doi]
- An Approach to Improve the Robustness of Machine Learning based Intrusion Detection System Models Against the Carlini-Wagner AttackMedha Pujari, Bhanu Cherukuri, Ahmad Y. Javaid, Weiqing Sun. 62-67 [doi]
- Semantic-Aware Vulnerability DetectionZhen Huang, Marc White. 68-75 [doi]
- OGMA: Visualisation for Software Container Security Analysis and Automated RemediationAlan Mills, Jonathan White, Phil Legg. 76-81 [doi]
- Configuration vulnerability in SNORT for Windows Operating SystemsLuca Faramondi, Marta Grassi, Simone Guarino, Roberto Setola, Cristina Alcaraz. 82-89 [doi]
- IPASS: A Novel Open-Source Intelligence Password Scoring SystemJoshua Hubbard, Gueltoum Bendiab, Stavros Shiaeles. 90-95 [doi]
- Auditing a Software-Defined Cross Domain Solution ArchitectureNathan Daughety, Marcus Pendleton, Rebeca Perez, Shouhuai Xu, John Franco. 96-103 [doi]
- ICT in Healthcare: the role of IoT and the SECANT solutionM. Caballero, Dimitris Kavallieros, A. Spyros, A. Tavernarakisv, A. Tziouvaras, Stefano Bonacina, K. Chandrarmouli, M. Coroiu, L. Chen, T. Dounia, I. Giannoulakis, N. Gligoric, E. Kafetzakis, T. Kasig, V. Koumaras, T. Krousarlis, K. Lapidaki, A. Markakis, S. Marin, M. Manulis, S. Menesidou, S. Nifakos, L. Meng, S. Mhiri, M. Nati, K. Ntafloukas, D. Oniga, D. Papamartzivanos, S. Papastergiou, K. Sanchez, C. Sakkas, K. Stelliou, L. Trujillo, Theodora Tsikrika, E. Venegas, Stefanos Vrochidis, D. Xydias. 104-111 [doi]
- SENTINEL - Approachable, tailor-made cybersecurity and data protection for small enterprisesTatiana Trantidou, George Bravos, Philippe Valoggia, Ioannis Skourtis, Manolis Falelakis, Kostas Poulios, Ilias Spais, Sotiris Ioannidis, Thomas Oudin, Ruben Costa, Christopher Konialis, Daryl Holkham, Zoe Kasapi, Athanasios Karantjias. 112-117 [doi]
- A Blockchain-based Trustworthy Cloud Services Digital EcosystemEmanuele Bellini 0001, Iolanda Aversa, Stelvio Cimato, Antonio Esposito 0001. 118-124 [doi]
- CIDS: Collaborative Intrusion Detection System using Blockchain TechnologyGopal Gurung, Gueltoum Bendiab, Maria Shiaele, Stavros Shiaeles. 125-130 [doi]
- Blockchain-Enabled Digital Forensics for the IoT: Challenges, Features, and Current FrameworksSotirios Brotsis, Nicholas Kolokotronis. 131-137 [doi]
- Android Device Incident Response: Viber AnalysisAlexandros Vasilaras, Donatos Dosis, Michael Kotsis, Panagiotis Rizomiliotis. 138-142 [doi]
- SeeShells: An Optimized Solution for Utilizing Shellbags in a Digital Forensic InvestigationEdward L. Amoruso, Richard Leinecker, Cliff C. Zou. 143-148 [doi]
- Evaluating Perceptual Hashing Algorithms in Detecting Image Manipulation Over Social Media PlatformsMohammed Alkhowaiter, Khalid Almubarak, Cliff Zou. 149-156 [doi]
- On the (in)security of Memory Protection Units : A Cautionary NoteMichele Grisafi, Mahmoud Ammar, Bruno Crispo. 157-162 [doi]
- ETHERLED: Sending Covert Morse Signals from Air-Gapped Devices via Network Card (NIC) LEDsMordechai Guri. 163-170 [doi]
- How to Build a SOC on a BudgetRisto Vaarandi, Sten Mäses. 171-177 [doi]
- SoK: Demystifying Cyber Resilience Quantification in Cyber-Physical SystemsHwiwon Lee, Sosun Kim, Huy Kang Kim. 178-183 [doi]
- An Approach to Address Risk Management Challenges: Focused on IT Governance FrameworkRazan M. Boodai, Hadeel A. Alessa, Arwa H. Alanazi. 184-188 [doi]
- CoReTM: An Approach Enabling Cross-Functional Collaborative Threat ModelingJan von der Assen, Muriel Figueredo Franco, Christian Killer, Eder J. Scheid, Burkhard Stiller. 189-196 [doi]
- Enhancing the Aggregation of the Federated Learning for the Industrial Cyber Physical SystemsSouhila Badra Guendouzi, Samir Ouchani, Mimoune Malki. 197-202 [doi]
- Improving Resilience in Cyber-Physical Systems based on Transfer LearningMehdi Saman Azari, Francesco Flammini, Stefania Santini. 203-208 [doi]
- ML-based Anomaly Detection System for DER DNP3 Communication in Smart GridMoataz AbdelKhalek, Manimaran Govindarasu. 209-214 [doi]
- Moving Target Defense Routing for SDN-enabled Smart GridMoataz AbdelKhalek, Burhan Hyder, Manimaran Govindarasu, Craig G. Rieger. 215-220 [doi]
- Neural Network based Temporal Point Processes for Attack Detection in Industrial Control SystemsGiancarlo Fortino, Claudia Greco, Antonella Guzzo, Michele Ianni. 221-226 [doi]
- Control Logic Obfuscation Attack in Industrial Control SystemsNauman Zubair, Adeen Ayub, Hyunguk Yoo, Irfan Ahmed 0001. 227-232 [doi]
- ML-based Anomaly Detection for Intra-Vehicular CAN-bus NetworksShaurya Purohit, Manimaran Govindarasu. 233-238 [doi]
- Powertrace-based Fuzzing of CAN Connected HardwareMurray Dunne, Sebastian Fischmeister. 239-244 [doi]
- A Comparative Overview of Automotive Radar Spoofing CountermeasuresMinh A. Vu, William C. Headley, Kevin P. Heaslip. 245-252 [doi]
- BLEND: Efficient and blended IoT data storage and communication with application layer securityJoel Höglund, Shahid Raza. 253-260 [doi]
- Modelling and Assessing the Risk of Cascading Effects with ResilBlocklyIrene Bicchierai, Enrico Schiavone, Francesco Brancati. 261-266 [doi]
- Towards Continuous Enrichment of Cyber Threat Intelligence: A Study on a Honeypot DatasetArnolnt Spyros, Angelos Papoutsis, Ilias Koritsas, Notis Mengidis, Christos Iliou, Dimitris Kavallieros, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris. 267-272 [doi]
- Combining text analysis techniques with unsupervised machine learning methodologies for improved software vulnerability managementMike Anastasiadis, Georgios Aivatoglou, Georgios Spanos, Antonis Voulgaridis, Konstantinos Votis. 273-278 [doi]
- Policy-Based Profiles for Network Intrusion Response SystemsKieran Hughes, Kieran McLaughlin, Sakir Sezer. 279-286 [doi]
- Using Potential Effects on Threat Events (PETE) to Assess Mitigation Effectiveness and Return on Investment (ROI)Deborah J. Bodeau, Richard D. Graubart, Rosalie McQuaid. 287-292 [doi]
- Process Mining for Asymmetric Cybersecurity AuditRonald C. Turner. 293-298 [doi]
- Leveraging Cyber Ranges for Prototyping, Certification and Training: The ECHO caseNotis Mengidis, Maya Bozhilova, Cyril Ceresola, Consuelo Colabuono, Michael Cooke, Gregory Depaix, Angel Genchev, Georgi Koykov, Wim Mees, Matteo Merialdo, Antonis Voulgaridis, Theodora Tsikrika, Konstantinos Votis, Stefanos Vrochidis. 299-304 [doi]
- Design and proof of concept of a prediction engine for decision support during cyber range attack simulations in the maritime domainMarkos Antonopoulos, Giorgos Drainakis, Eleftherios Ouzounoglou, Giorgos Papavassiliou, Angelos Amditis. 305-310 [doi]
- Employing social network analysis to dark web communitiesSotirios Nikoletos, Paraskevi Raftopoulou. 311-316 [doi]
- Phishing Detection Using Machine Learning AlgorithmJibrilla Tanimu, Stavros Shiaeles. 317-322 [doi]
- Machine Learning-based Ransomware Detection Using Low-level Memory Access Patterns Obtained From Live-forensic HypervisorManabu Hirano, Ryotaro Kobayashi. 323-330 [doi]
- A Bayesian Model Combination based approach to Active Malware AnalysisAbhilash Hota, Jürgen Schönwälder. 331-336 [doi]
- A Comprehensive API Call Analysis for Detecting Windows-Based RansomwareP. Mohan Anand, P. V. Sai Charan, Sandeep K. Shukla. 337-344 [doi]
- Protecting IEC 60870-5-104 ICS/SCADA Systems with HoneypotsElisavet Grigoriou, Athanasios Liatifis, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Ioannis D. Moscholios, Evangelos Markakis, Panagiotis G. Sarigiannidis. 345-350 [doi]
- Risk Analysis of DNP3 AttacksVasiliki Kelli, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Evangelos K. Markakis, Panagiotis G. Sarigiannidis. 351-356 [doi]
- Privacy Preserving Human Activity Recognition Using Microaggregated Generative Deep LearningAhmed AlEroud, Majd Shariah, Rami Malkawi. 357-363 [doi]
- Current drainage induced by bias injection attack against Kalman filter of BLDC motorYuri B. Boiko, Iluju Kiringa, Tet Hin Yeap. 364-369 [doi]
- A Multi-Level Trust Framework for the Internet of Underwater ThingsAbeer Almutairi, Ying He, Steven Furnell. 370-375 [doi]
- FFDA: A novel Four-Factor Distributed Authentication mechanismJack Edwards, Francisco J. Aparicio-Navarro, Leandros A. Maglaras, Christos Douligeris. 376-381 [doi]
- A Supply Chain Service Cybersecurity Certification Scheme based on the Cybersecurity ActAlexandra Michota, Nineta Polemi. 382-387 [doi]
- Training the Maritime Security Operations Centre TeamsMarco Raimondi, Giacomo Longo, Alessio Merlo, Alessandro Armando, Enrico Russo. 388-393 [doi]
- Cybersecurity at Merchant ShippingEvangelos D. Charitos, Nikolaos A. Kounalakis, Ioanna Kantzavelou. 394-399 [doi]