Abstract is missing.
- Comparative Analysis of Pattern Mining Algorithms for Event LogsOrkhan Gasimov, Risto Vaarandi, Mauno Pihelgas. 1-7 [doi]
- To TTP or not to TTP?: Exploiting TTPs to Improve ML-based Malware DetectionYashovardhan Sharma, Eleonora Giunchiglia, Simon Birnbach, Ivan Martinovic. 8-15 [doi]
- stealthML: Data-driven Malware for Stealthy Data ExfiltrationKey-whan Chung, Phuong Cao, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 16-21 [doi]
- Explaining Binary ObfuscationClaudia Greco, Michele Ianni, Antonella Guzzo, Giancarlo Fortino. 22-27 [doi]
- New Version, New Answer: Investigating Cybersecurity Static-Analysis Tool FindingsAnn Marie Reinhold, Travis Weber, Colleen Lemak, Derek Reimanis, Clemente Izurieta. 28-35 [doi]
- Qerberos: A Protocol for Secure Distribution of QRNG KeysDavid Soler, Carlos Dafonte, Francisco Javier Nóvoa, Manuel Fernández-Veiga, Ana Fernández Vilas, Rebeca P. Díaz Redondo. 36-41 [doi]
- Efficiency of Malware Detection Based on DNS Packet Analysis Over Real Network TrafficLorenzo Principi, Marco Baldi, Alessandro Cucchiarelli, Luca Spalazzi. 42-47 [doi]
- A Cost-Efficient Threat Intelligence Platform Powered by Crowdsourced OSINTAlexander Khalil Daou, Fudong Li 0001, Stavros Shiaeles. 48-53 [doi]
- A Driver Detection Method by Means of Explainable Deep LearningFabio Martinelli, Francesco Mercaldo, Antonella Santone. 54-59 [doi]
- Optimizing AI for Mobile Malware Detection by Self-Built-Dataset GAN Oversampling and LGBMOrtal Dayan, Lior Wolf, Fang Wang, Yaniv Harel. 60-65 [doi]
- Cream Skimming the Underground: Identifying Relevant Information Points from Online ForumsFelipe Moreno Vera, Mateus Schulz Nogueira, Cainã Figueiredo, Daniel S. Menasché, Miguel Angelo Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar. 66-71 [doi]
- Anomaly-Based Intrusion Detection in IIoT Networks Using Transformer ModelsJorge Casajús-Setién, Concha Bielza, Pedro Larrañaga. 72-77 [doi]
- Key Update for the IoT Security Standard OSCORERikard Höglund, Marco Tiloca, Simon Bouget, Shahid Raza. 78-85 [doi]
- A Multi-Class Intrusion Detection System Based on Continual LearningChrysoula Oikonomou, Ilias Iliopoulos, Dimosthenis Ioannidis, Dimitrios Tzovaras. 86-91 [doi]
- Blockchain-Based Trustworthy O2O Interaction in the Next 6G EcosystemEmanuele Bellini 0001, Ernesto Damiani, Stefano Marrone 0001. 92-98 [doi]
- A Recipe for Cost-Effective Secure IoT: the Safe Place Project Case StudyFrancesco Palmarini, Leonardo Veronese, Matteo Busi 0001, Riccardo Focardi, Flaminia L. Luccio. 99-104 [doi]
- VulDetect: A novel technique for detecting software vulnerabilities using Language ModelsMarwan Omar, Stavros Shiaeles. 105-110 [doi]
- Understanding Human Factors of Cybersecurity: Drivers of Insider ThreatsMarcus L. Green, Priya Dozier. 111-116 [doi]
- DDoS Attack Detection in a Real Urban IoT Environment Using Federated Deep LearningKhatereh Ahmadi, Reza Javidan. 117-122 [doi]
- Moving Target Defense Strategy Selection against Malware in Resource-Constrained DevicesJan von der Assen, Alberto Huertas Celdrán, Nicolas Huber, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller. 123-129 [doi]
- HSchain: Anonymous Permissioned Blockchain with Enhanced AuditabilityJipeng Hou, Lei Xu 0016, Liehuang Zhu, Peng Jiang, Shaorui Song. 130-135 [doi]
- Real-Time APT Detection Technologies: A Literature ReviewSimon Paul Mönch, Hendrik Roth. 136-141 [doi]
- Hunting IoT Cyberattacks With AI - Powered Intrusion DetectionSevasti Grigoriadou, Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, Ioannis Makris, Thomas Lagkas, Vasileios Argyriou, Anastasios Lytos, Eleftherios Fountoukidis. 142-147 [doi]
- BTV2P: Blockchain-based Trust Model for Secure Vehicles and Pedestrians NetworksMassinissa Chelghoum, Gueltoum Bendiab, Mohamed Benmohammed, Stavros Shiaeles, Emanuele Bellini 0001. 148-153 [doi]
- Efficient Early Anomaly Detection of Network Security Attacks Using Deep LearningTanwir Ahmad, Dragos Truscan. 154-159 [doi]
- An Explainable Artificial Intelligence Approach for a Trustworthy Spam DetectionAbubakr Ibrahim, Mohamed Mejri, Fehmi Jaafar. 160-167 [doi]
- Assessing Cybersecurity Hygiene and Cyber Threats Awareness in the Campus - A Case Study of Higher Education Institutions in Portugal and PolandLuís Oliveira, Andrzej Chmielewski, Paulina Rutecka, Karina Cicha, Mariia Rizun, Nuno Torres, Pedro Pinto 0001. 168-173 [doi]
- Multi-party Computation for Privacy and Security in Machine Learning: a Practical ReviewAlessandro Bellini, Emanuele Bellini 0001, Massimo Bertini, Doaa Almhaithawi, Stefano Cuomo. 174-179 [doi]
- Federated Learning-Based Credit Card Fraud Detection: Performance Analysis with Sampling Methods and Deep Learning AlgorithmsNahid Ferdous Aurna, Md. Delwar Hossain, Yuzo Taenaka, Youki Kadobayashi. 180-186 [doi]
- Early Detection of Reconnaissance Attacks on IoT Devices by Analyzing Performance and Traffic CharacteristicsPrathibha Keshavamurthy, Sarvesh Kulkarni. 187-193 [doi]
- Cyber Incident Scenarios in the Maritime Industry: Risk Assessment and Mitigation StrategiesMohamed Amine Ben Farah, M. Omar Al-Kadri, Yussuf Ahmed, Raouf Abouzariba, Xavier J. A. Bellekens. 194-199 [doi]
- A Taxonomic Survey of Model Extraction AttacksDidem Genç, Mustafa Özuysal, Emrah Tomur. 200-205 [doi]
- Phishing and Smishing Detection Using Machine LearningHadi El Karhani, Riad Al Jamal, Yorgo Bou Samra, Imad H. Elhajj, Ayman I. Kayssi. 206-211 [doi]
- Evaluation of Applying LDA to Redacted Documents in Security and Safety AnalysisKatsuyuki Umezawa, Sven Wohlgemuth, Keisuke Hasegawa, Kazuo Takaragi. 212-218 [doi]
- Denial of Service Attack Detection via Differential Analysis of Generalized Entropy ProgressionsOmer Subasi, Joseph B. Manzano, Kevin Barker. 219-226 [doi]
- Ransomware Detection based on Network Behavior using Machine Learning and Hidden Markov Model with Gaussian EmissionAman Srivastava, Nitesh Kumar, Anand Handa, Sandeep K. Shukla. 227-233 [doi]
- A Taxonomy for Tsunami Security Scanner PluginsGonçalo Lima, Vitor Hugo Gonçalves, Pedro Pinto. 234-239 [doi]
- ML and Network Traces to M.A.R.SWaldemar Cruz, Laurent D. Michel, Benjamin Drozdenko, Steven Roodbeen. 240-245 [doi]
- Deepfake Detection with Deep Learning: Convolutional Neural Networks versus TransformersVrizlynn L. L. Thing. 246-253 [doi]
- A Survey of Attacks and Defenses for Deep Neural NetworksDaniel Machooka, Xiaohong Yuan, Albert C. Esterline. 254-261 [doi]
- Mitigating Membership Inference Attacks in Machine Learning as a ServiceMyria Bouhaddi, Kamel Adi. 262-268 [doi]
- Attacking a packet Analyzer: Caronte case studyDaniele Granata, Massimiliano Rak, Francesco Grimaldi. 269-274 [doi]
- Exposed: Critical Vulnerabilities in USSD Banking Authentication ProtocolsZaynab Lamoyero, Oluwatobi Fajana. 275-280 [doi]
- SoK: Static Configuration Analysis in Infrastructure as Code ScriptsPandu Ranga Reddy Konala, Vimal Kumar, David Bainbridge 0001. 281-288 [doi]
- Detecting Internal Reconnaissance Behavior Through Classification of Command CollectionsLuke Vandenberghe, Hari Manassery Koduvely, Maria Pospelova. 289-294 [doi]
- Understanding Resilience: Looking at Frameworks & Standards - A Systematic Study from Cyber PerspectiveNishanth Laxman, Daniel Krohmer, Markus Damm, Reinhard Schwarz, Pablo Oliveira Antonino. 295-300 [doi]
- Merging Model-Based and Data-Driven Approaches for Resilient Systems Digital Twins DesignLelio Campanile, Maria Stella De Biase, Roberta De Fazio, Michele Di Giovanni, Fiammetta Marulli, Laura Verde. 301-306 [doi]
- A Semi-automatic Approach for Enhancing the Quality of Automatically Generated InventoriesSilvia Bonomi, Marco Cuoci, Simone Lenti. 307-314 [doi]
- Cyber threat hunting using unsupervised federated learning and adversary emulationSaeid Sheikhi, Panos Kostakos 0001. 315-320 [doi]
- Automated Patch Management: An Empirical Evaluation StudyVida Ahmadi Mehri, Patrik Arlos, Emiliano Casalicchio. 321-328 [doi]
- Towards Automated Cyber Range Design: Characterizing and Matching Demands to SuppliesEkzhin Ear, Jose L. C. Remy, Shouhuai Xu. 329-334 [doi]
- Nudge to Promote Employees' Information Security Compliance Behavior: A Field StudyMidori Inaba, Takeaki Terada. 335-340 [doi]
- Formal Verification of a V2X Privacy Preserving Scheme Using ProverifSimone Bussa, Riccardo Sisto, Fulvio Valenza. 341-346 [doi]
- A Game of Age of Incorrect Information Against an Adversary Injecting False DataValeria Bonagura, Stefano Panzieri, Federica Pascucci, Leonardo Badia. 347-352 [doi]
- Proactive Measures for Cyber-Physical Systems CybersecurityKamal Taha. 353-358 [doi]
- Enhancing Cyber-Resilience in Self-Healing Cyber-Physical Systems with Implicit GuaranteesRandolph Loh, Vrizlynn L. L. Thing. 359-366 [doi]
- Detecting Subspace Malicious Vectors Attack Against Smart Grid Using Sequence-Alignment MethodKhaled Alotaibi, Rafat Rob, Dana Nour, Doaa Zamzami. 367-372 [doi]
- Small Satellite System Modeling for Vulnerability AnalysisKyle Murbach, Tommy Morris, Fred Wiersig, Jeffery Golden. 373-380 [doi]
- SPAT: A Testbed for Automotive Cybersecurity TrainingRoberto Caviglia, Giovanni Battista Gaggero, Nicola Vincis, Omar Morando, Alessio Aceti, Mario Marchese. 381-386 [doi]
- Enhancing Industrial Cyber-Physical Systems Security with Smart Probing ApproachValeria Bonagura, Chiara Foglietta, Stefano Panzieri, Federica Pascucci. 387-393 [doi]
- Control-Implications-Based Side-Channel Monitoring for Embedded SystemsSandip Roy 0002, Benjamin Drozdenko. 394-399 [doi]
- Identification of Vulnerable IoT Enabled Transportation Infrastructure into a Cyber-Physical Transportation NetworkKonstantinos Ntafloukas, Liliana Pasquale, Beatriz Martinez-Pastor, Daniel P. McCrum. 400-405 [doi]
- Default Credentials Vulnerability: The Case Study of Exposed IP CamsStefano Perone, Luca Faramondi, Roberto Setola. 406-411 [doi]
- Evaluating Machine Learning Approaches for Cyber and Physical Anomalies in SCADA SystemsLuca Faramondi, Francesco Flammini, Simone Guarino, Roberto Setola. 412-417 [doi]
- Evaluating a Process-Aware IDS for Smart Grids on Distributed HardwareVerena Menzel, Kai Oliver Großhanten, Anne Remke. 418-425 [doi]
- A Feature-Aware Semi-Supervised Learning Approach for Automotive EthernetKabid Hassan Shibly, Md. Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi. 426-431 [doi]
- Trojan Triggers for Poisoning Unmanned Aerial Vehicles Navigation: A Deep Learning ApproachMohammed Mynuddin, Sultan Uddin Khan, Mahmoud Nabil Mahmoud. 432-439 [doi]
- Trustworthiness-Related Risks in Autonomous Cyber-Physical Production Systems - A SurveyMaryam Zahid, Alessio Bucaioni, Francesco Flammini. 440-445 [doi]
- IoT Forensics: Analysis of Ajax Systems' mobile app for the end userEvangelos Dragonas, Costas Lambrinoudakis. 446-451 [doi]
- IoT Forensics: Investigating the Mobile App of Dahua TechnologyEvangelos Dragonas, Costas Lambrinoudakis, Michael Kotsis. 452-457 [doi]
- Cyber Resilience, Societal Situational Awareness for SMERob Van Kranenburg, Rohit Bohara, Raphael Yahalom, Mirko Ross. 458-463 [doi]
- Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domainGeorge Hatzivasilis, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Guillermo Jiménez Prieto, Araceli Rojas Morgan, Miguel Juaniz Lopez, Cataldo Basile, José Francisco Ruiz. 464-469 [doi]
- Verified Value Chains, Innovation and CompetitionArnd Weber, Sylvain Guilley, René Rathfelder, Marc Stöttinger, Christoph Lüth, Maja Malenko, Torsten Grawunder, Steffen Reith, Armand Puccetti, Jean-Pierre Seifert, Norbert Herfurth, Hagen Sankowski, Gernot Heiser. 470-476 [doi]
- Improving the Detection of Unknown DDoS Attacks through Continual LearningBeny Nugraha, Krishna Yadav, Parag Patil, Thomas Bauschert. 477-483 [doi]
- RoG§: A Pipeline for Automated Sensitive Data Identification and AnonymisationSotirios Nikoletos, Stefanos Vlachos, Efstathios Zaragkas, Costas Vassilakis, Christos Tryfonopoulos, Paraskevi Raftopoulou. 484-489 [doi]
- Reviewing BPMN as a Modeling Notation for CACAO Security PlaybooksMateusz D. Zych, Vasileios Mavroeidis, Konstantinos Fysarakis, Manos Athanatos. 490-495 [doi]
- Minimizing Software-Rooted Risk through Library Implementation SelectionPanagiotis Sotiropoulos, Christos-Minas Mathas, Costas Vassilakis, Nicholas Kolokotronis. 496-502 [doi]
- Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise?Breno Tostes, Leonardo Ventura, Enrico Lovat, Matheus Martins, Daniel S. Menasché. 503-510 [doi]
- An Open Sharing Method for Digital Heritage Assets Based on Self-Sovereign Identity TechnologyJiali Zhu, Zhenxin Wu. 511-515 [doi]
- Metadata and Semantic Annotation of Digital Heritage Assets: a case studyAlba Amato, Dario Branco, Salvatore Venticinque, Giuseppina Renda, Sabrina Mataluna. 516-522 [doi]
- Modelling and Analysing Security Threats Targeting Protective Relay Operations in Digital SubstationsMohamed Faisal Elrawy, Lenos Hadjidemetriou, Christos Laoudias, Maria K. Michael. 523-529 [doi]
- Threat intelligence using Digital Twin honeypots in CybersecurityMaria Nintsiou, Elisavet Grigoriou, Paris-Alexandros Karypidis, Theocharis Saoulidis, Eleftherios Fountoukidis, Panagiotis G. Sarigiannidis. 530-537 [doi]
- PHOENI2X - A European Cyber Resilience Framework With Artificial-Intelligence-Assisted Orchestration, Automation & Response Capabilities for Business Continuity and Recovery, Incident Response, and Information ExchangeKonstantinos Fysarakis, Alexios Lekidis, Vasileios Mavroeidis, Konstantinos Lampropoulos 0001, George L. Lyberopoulos, Ignasi Garcia-Milà Vidal, José Carles Terés i Casals, Eva Rodriguez Luna, Alejandro Antonio Moreno Sancho, Antonios Mavrelos, Marinos Tsantekidis, Sebastian Pape 0001, Argyro Chatzopoulou, Christina Nanou, George Drivas, Vangelis Photiou, George Spanoudakis, Odysseas G. Koufopavlou. 538-545 [doi]
- Towards a Hybrid Multi-Layer Blockchain-Based Energy Trading Market for MicrogridsPanagiotis Savvidis, Nikolaos Vakakis, Antonis Voulgaridis, Emanuele Bellini 0001, Dimosthenis Ioannidis, Konstantinos Votis, Dimitrios Tzovaras. 546-551 [doi]
- Area-Delay Efficient Security Scheme for Smart Hospital SystemsKyriaki Tsantikidou, Dimitrios Boufeas, Nicolas Sklavos 0001. 552-557 [doi]
- A PUF Based on the Non-Linearity of MemristorsCallum Aitchison, Basel Halak, Alexander Serb, Themis Prodromakis. 558-563 [doi]
- Breaking AES-128: Machine Learning-Based SCA Under Different Scenarios and DevicesSara Tehranipoor, Nima Karimian, Jack Edmonds 0002. 564-571 [doi]
- A New Fast and Side-Channel Resistant AES Hardware ArchitectureMarco Macchetti, Hervé Pelletier, Cédric Groux. 572-579 [doi]
- Randomized Addressing Countermeasures are Inefficient Against Address-Bit SCAIevgen Kabin, Zoya Dyka, Peter Langendoerfer. 580-585 [doi]
- Counteracting Modeling Attacks Using Hardware-Based Dynamic Physical Unclonable FunctionShailesh Rajput, Jaya Dofe. 586-591 [doi]
- Algorithm for simplifying the SHA-256 operations treeAndrey Plotnikov, Alla Levina. 592-597 [doi]
- A Practical and Scalable Privacy-preserving FrameworkNikos Avgerinos, Salvatore D'Antonio, Irene Kamara, Christos Kotselidis, Ioannis Lazarou, Teresa Mannarino, Georgios Meditskos, Konstantina Papachristopoulou, Angelos Papoutsis, Paolo Roccetti, Martin Zuber. 598-603 [doi]
- Introducing the TRUMPET project: TRUstworthy Multi-site Privacy Enhancing TechnologiesAlberto Pedrouzo-Ulloa, Jan Ramon, Fernando Pérez-González, Siyanna Lilova, Patrick Duflot, Zakaria Chihani, Nicola Gentili, Paola Ulivi, Mohammad Ashadul Hoque, Twaha Mukammel, Zeev Pritzker, Augustin Lemesle, Jaime Loureiro-Acuña, Xavier Martínez, Gonzalo Jiménez-Balsa. 604-611 [doi]
- Practical Multi-Key Homomorphic Encryption for More Flexible and Efficient Secure Federated Average AggregationAlberto Pedrouzo-Ulloa, Aymen Boudguiga, Olive Chakraborty, Renaud Sirdey, Oana Stan, Martin Zuber. 612-617 [doi]
- Comparison of machine learning models applied on anonymized data with different techniquesJudith Sáinz-Pardo Díaz, Álvaro López García. 618-623 [doi]
- Privacy-preserving Federated Learning System for Fatigue DetectionMohammadreza Mohammadi, Roberto Allocca, David Eklund, Rakesh Shrestha, Sima Sinaei. 624-629 [doi]
- FedGA-Meta: Federated Learning Framework using Genetic Algorithms and Meta-Learning for Aggregation in Industrial Cyber- Physical SystemsSouhila Badra Guendouzi, Samir Ouchani, Hiba El Assaad, Madeleine El-Zaher. 630-635 [doi]
- How to secure the IoT-based surveillance systems in an ELEGANT wayAleksandra Pawlicka, Damian Puchalski, Marek Pawlicki, Rafal Kozik, Michal Choras. 636-640 [doi]
- The Alliance of HE and TEE to Enhance their Performance and SecuritySalvatore D'Antonio, Giannis Lazarou, Giovanni Mazzeo, Oana Stan, Martin Zuber, Ioannis Tsavdaridis. 641-647 [doi]
- Detection of Radio Frequency Interference in Satellite Ground SegmentsLuigi Coppolino, Salvatore D'Antonio, Federica Uccello, Anastasios Lyratzis, Constantinos Bakalis, Souzana Touloumtzi, Ioannis Papoutsis. 648-653 [doi]
- Comparison of Machine Learning Algorithms Trained Under Differential Privacy for Intrusion Detection SystemsIoannis Siachos, Konstantinos Kaltakis, Konstantina Papachristopoulou, Ioannis Giannoulakis, Emmanouil Kafetzakis. 654-658 [doi]