Abstract is missing.
- Message from the ChairsStavros Shiaeles, Nicholas Kolokotronis, Emanuele Bellini 0001. [doi]
- Peer-to-Peer Meets Onion: The Veilid FrameworkSven Glatzer, Stavros Shiaeles, Rinat Khusainov, Rahim Taheri. 1-6 [doi]
- Ransomware Detection: Ensemble Machine Learning Models Using Disjoint DataCharles M. R. Da Silva, Paulo André L. De Castro, Cecilia De A. C. Cesar. 1-6 [doi]
- Anomaly Detection in Operational Technology Systems Using Non-Intrusive Load Monitoring Based on Supervised LearningA. Schroeder, Patrick McClure, P. Thulasiraman. 1-6 [doi]
- A Deep Learning Framework for Safety Monitoring of a Railway SectionF. Z. Chriki, E. Simó, Francesc Aguiló, I. Garcia-Milà, X. Masip. 1-6 [doi]
- Uncovering Hidden Threats: Automated, Machine Learning-based Discovery & Extraction of Cyber Threat Intelligence from Online SourcesRafail A. Ellinitakis, Konstantinos Fysarakis, Panagiotis Bountakas, George Spanoudakis. 1-6 [doi]
- DIONYSUS - Deception Networks for the Cybersecurity of Physical Protection SystemsCyprien de la Vergne de Cerval, Eric Perret, Jonathan Sarrazin, Olivier Fichot, Vincent E. Urias, William M. S. Stout, Shadya B. Maldonado Rosado. 1-6 [doi]
- Navigating (in)Security of AI-Generated CodeSri Haritha Ambati, Norah Ridley, Enrico Branca, Natalia Stakhanova. 1-8 [doi]
- An SDR-Based Framework for Cybersecurity Assessment of Vehicle-to-Everything (V2X) SystemsMuhammad Saad Sohail, Giancarlo Portamauro, Fabio Patrone, Mario Marchese. 1-8 [doi]
- Automatic Discovery of CyberattacksGuillaume Hutzler, Hanna Klaudel, Witold Klaudel, Franck Pommereau, Artur Rataj. 1-8 [doi]
- Safety Analysis for Cyber-Physical Systems Under Cyber Attacks Using Digital TwinRuizhe Wang, Sarad Venugopalan, Sridhar Adepu. 1-8 [doi]
- A Hybrid Ensemble Learning-Based Intrusion Detection System for the Internet of ThingsMohammed M. Alani, Ali Ismail Awad, Ezedin Barka. 1-8 [doi]
- A Trust Management Delegation Protocol for Fog Computing ApplicationsPhongsathon Fongta, Sotirios Terzis. 1-6 [doi]
- Developing a Robust Communication Infrastructure for a Distributed Smart Grid IDSVerena Menzel, Jan Speckamp, Anne Remke. 1-8 [doi]
- Explainable Federated Learning for Botnet Detection in IoT NetworksRajesh Kalakoti, Hayretdin Bahsi, Sven Nõmm. 1-8 [doi]
- Forensic Analysis of Android Notifications' HistoryEvangelos Dragonas, Costas Lambrinoudakis. 1-6 [doi]
- Understanding & Mitigating the Challenges of Securing Jupyter Notebooks OnlineAdrian Ramsingh, Pradeep Verma. 1-7 [doi]
- Verifying the Robustness of Machine Learning based Intrusion Detection Against Adversarial PerturbationEhsan Nowroozi, Rahim Taheri, Mehrdad Hajizadeh, Thomas Bauschert. 9-15 [doi]
- ReBotDetector: A Detection Model with LSTM Feature Extractor for Session-Replay Web Bot Attacksshadi sadeghpour, Natalija Vlajic. 16-21 [doi]
- When Rewards Deceive: Counteracting Reward Poisoning on Online Deep Reinforcement LearningMyria Bouhaddi, Kamel Adi. 38-44 [doi]
- Are IDS Violating Segmentation in Industrial Networks?Giovanni Battista Gaggero, Roberto Caviglia, Paola Girdinio, Mario Marchese. 45-49 [doi]
- New Approach to Shorten Feature Set via TF-IDF for Machine Learning-Based Webshell DetectionViet-Anh Phan, Jan Jerabek, Dinh Khanh Le, Tomás Gotthans. 50-55 [doi]
- Can Deep Learning Detect Fake News Better when Adding Context Features?Rachel Ladouceur, Abubakr Hassan, Mohamed Mejri, Fehmi Jaafar. 56-61 [doi]
- AI-Based Attacker Models for Enhancing Multi-Stage Cyberattack Simulations in Smart Grids Using Co-Simulation EnvironmentsÖmer Sen, Christoph Pohl, Immanuel Hacker, Markus Stroot, Andreas Ulbig. 68-75 [doi]
- A Version-Based Algorithm for Quality Enhancement of Automatically Generated Vulnerability InventoriesSilvia Bonomi, Marco Cuoci, Simone Lenti. 76-81 [doi]
- Enabling Cyber Threat Intelligence Sharing for Resource Constrained IoTAugust Karlsson, Rikard Höglund, Han Wang, Alfonso Iacovazzi, Shahid Raza. 82-89 [doi]
- Novel Approach to Tor User De-Anonymization: Client-Side Generated WatermarkDaniel Brown, Natalija Vlajic. 90-95 [doi]
- Deep Graph Learning for DDoS Detection and Multi-Class Classification IDSBraden J. Saunders, Robson E. De Grande, Glaucio H. S. Carvalho, Isaac Woungang. 96-100 [doi]
- Use of Visibility Graphs for the Early Detection of DoS AttacksJoão Lopes, Pedro Pinto 0001, Alberto Partida, António Pinto. 101-106 [doi]
- 2HD: Adaptive Adversarial Training for Hyperdimensional Computing-Based Intrusion Detection Against Adversarial AttacksOnat Güngör, Tajana Rosing, Baris Aksanli. 107-113 [doi]
- Emerging Trends in 5G Malicious Traffic Analysis: Enhancing Incremental Learning Intrusion Detection StrategiesZihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing. 114-119 [doi]
- Multi-Blockchain Model for IoT Devices Forensic Investigations on SpidernetSoraya Harding, Mo Adda. 120-126 [doi]
- A Forensic Framework for Screen Capture Validation in Legal ContextsClaudia Greco, Michele Ianni, Giuseppe Seminara, Antonella Guzzo, Giancarlo Fortino. 127-132 [doi]
- A Systematic Review of Cybersecurity Audit Frameworks for the Internet of ThingsDanielle Hanson, Jeremy Straub. 133-138 [doi]
- A Survey of Digital Forensic Tools for Android and iOS Smart PhonesSthembile Ntshangase, Norman Nelufule, David Mulihase, Mamello Mtshali, Chantel Mokoena, Palesa Moloi. 139-145 [doi]
- Active Learning-Based Mobile Malware Detection Utilizing Auto-Labeling and Data Drift DetectionZhe Deng, Arthur Hubert, Sadok Ben Yahia, Hayretdin Bahsi. 146-151 [doi]
- Rigorous Evaluation of Machine Learning-Based Intrusion Detection Against Adversarial AttacksOnat Güngör, Elvin Li, Zhengli Shang, Yutong Guo, Jing Chen, Johnathan Davis, Tajana Rosing. 152-158 [doi]
- A Hybrid Anomaly Detection Approach for Obfuscated MalwareGerard Shu Fuhnwi, Matthew Revelle, Clemente Izurieta. 159-165 [doi]
- Leveraging Threat Modelling for Effective Penetration Testing in 5G SystemsLuca Chianese, Daniele Granata, Paolo Palmiero, Massimiliano Rak. 180-185 [doi]
- The Danger Within: Insider Threat Modeling Using Business Process ModelsJan von der Assen, Jasmin Hochuli, Thomas Grübl, Burkhard Stiller. 186-192 [doi]
- Data Siphoning in ICSs: Attack Tree and Role of CryptoperiodsNatalija Vlajic, Gabriele Cianfarani, Robert Noce. 193-199 [doi]
- Harnessing TI Feeds for Exploitation DetectionKajal Patel, Zubair Shafiq, Mateus Schulz Nogueira, Daniel Sadoc Menasché, Enrico Lovat, Taimur Kashif, Ashton Woiwood, Matheus Martins. 200-207 [doi]
- Attack-Specific Feature Construction to Detect Malicious TCP FlowsVasudha Vedula, Rajendra V. Boppana, Palden Lama. 208-215 [doi]
- Empirical Analysis and Practical Assessment of Ransomware Attacks to Data in MotionRaúl Reinosa Simón, Clara I. Valero, José A. Martínez Cadenas, Elisa R. Heymann, Ignacio Lacalle, Barton P. Miller, Carlos Enrique Palau. 216-221 [doi]
- Investigating the Health State of X.509 Digital CertificatesSimone Orlando, Alessandro Barenghi, Gerardo Pelosi. 222-227 [doi]
- ROT: Retention and Operation Limitation Using TEESumit Kumar Paul, D. A. Knox. 228-234 [doi]
- Energy-efficient Hardening of the SEDIMENT Methodology for Scalable IoT Network SecurityDavid Shur, Giovanni Di Crescenzo, T. Chen, Zahir Patni, Y. J. Lin, Scott Alexander, Benjamin Flin, R. Levonas. 235-240 [doi]
- Detecting Covert Channels in Cloud Access Control Policies Using Large Language ModelsHrishikesh Karmarkar, Vaibhavi Joshi, R. Venkatesh 0001. 241-246 [doi]
- An End-to-End Framework for Cybersecurity Taxonomy and Ontology Generation and UpdatingAnna Kougioumtzidou, Angelos Papoutsis, Dimitrios Kavallieros, Thanassis Mavropoulos, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris. 247-254 [doi]
- Application of Robotic Exploration Principles to the Challenge of Cybersecurity Penetration TestingJeremy Straub. 255-261 [doi]
- Leveraging Reinforcement Learning in Red Teaming for Advanced Ransomware Attack SimulationsCheng Wang, Christopher Redino, Ryan Clark, Abdul-Rahman, Sal Aguinaga, Sathvik Murli, Dhruv Nandakumar, Roland Rao, Lanxiao Huang, Daniel Radke, Edward Bowen. 262-269 [doi]
- Autonomous Cyberattack with Security-Augmented Generative Artificial IntelligenceJonathan Gregory, Qi Liao. 270-275 [doi]
- A Looping Process for Cyberattack MitigationDaniele Bringhenti, Francesco Pizzato, Riccardo Sisto, Fulvio Valenza. 276-281 [doi]
- Structural Generalization in Autonomous Cyber Incident Response with Message-Passing Neural Networks and Reinforcement LearningJakob Nyberg, Pontus Johnson. 282-289 [doi]
- Ineffectiveness of Digital Transformations for Detecting Adversarial Attacks Against Quantized and Approximate CNNsSalvatore Barone, Valentina Casola, Salvatore Della Torca. 290-295 [doi]
- CyberMetric: A Benchmark Dataset based on Retrieval-Augmented Generation for Evaluating LLMs in Cybersecurity KnowledgeNorbert Tihanyi, Mohamed Amine Ferrag, Ridhi Jain, Tamás Bisztray, Mérouane Debbah. 296-302 [doi]
- A Time-Series and Density-Based Filter for DNS Log Reduction and AnalysisTaylor Perkins, Brian Lachine. 303-308 [doi]
- A Security Analysis of a Deterministic Key Generation SchemeDennis Song, YuPing Yan, George Shao, Feida Zhu, Mason Song. 309-314 [doi]
- Detecting Cryptographic Functions for String ObfuscationPierre Mondon, Rogério de Lemos. 315-320 [doi]
- Dynamic Security Provisioning for Cloud-Native Networks: An Intent-Based ApproachFrancesco Settanni, Alessandro Zamponi, Cataldo Basile. 321-328 [doi]
- Enhancing ATM Security Management in the Post-Quantum Era with Quantum Key DistributionFahad Ahmad, Katerina Kanta, Stavros Shiaeles, Afia Naeem, Zarnab Khalid, Kainaat Mahboob. 329-334 [doi]
- Identifying Android Banking Malware Through Measurement of User Interface ComplexitySean McElroy. 348-353 [doi]
- Advancing Security in 5G Core Networks Through Unsupervised Federated Time Series ModelingSaeid Sheikhi, Panos Kostakos 0001. 353-356 [doi]
- Building a Secure Cross-Device Communication Channel for Smart Devices Based on App AccountsLanlan Pan, Ruonan Qiu, Chuan Zhang, Minghui Yang. 360-366 [doi]
- A Privacy-Preserving and Secure Scheme for Online Payment in the Realm of Mobile CommerceMohammad Rasool Momeni, Abdollah Jabbari, Carol J. Fung. 367-372 [doi]
- IPv6 Connection Shuffling for Moving Target Defense (MTD) in SDNNicholas Mayone, Pascal Kunz, Beytüllah Yigit, Wissem Soussi, Burkhard Stiller, Gürkan Gür. 373-378 [doi]
- Evaluating Few-Shot Learning Generative Honeypots in A Live DeploymentJarrod Ragsdale, Rajendra V. Boppana. 379-386 [doi]
- A Modular Generative Honeypot ShellSaul Johnson, Remco Hassing, Jeroen Pijpker, Rob Loves. 387-394 [doi]
- Can a Llama Be a Watchdog? Exploring Llama 3 and Code Llama for Static Application Security TestingClaudio Curto, Daniela Giordano, Daniel Gustav Indelicato, Vladimiro Patatu. 395-400 [doi]
- Video-Based Abnormal Human Behaviour Detection for Video ForensicsIntissar ZIANI, Gueltoum Bendiab, Mourad Bouzenada, Stavros Shiaeles. 401-406 [doi]
- On Impact of Video Motion on Image Encryption/Decryption. Comparative ResultsAnastasiia Voitenko, Mourad Oussalah 0002. 407-412 [doi]
- Static Detection of Missing Validations in Solidity Smart ContractsSundas Munir, Walid Taha, Mirza Sanam Iqbal Baig. 413-420 [doi]
- SEAGuard: A Blockchain-Based Security Framework for IoT Maritime Transportation SystemsPanagiotis Leonis, Konstantinos Ntouros, Antonio I. Mazilu, Sotirios Brotsis, Nicholas Kolokotronis. 421-426 [doi]
- Rényi Differential Privacy Analysis of Skellam Under Federated Learning in Internet of Health ThingsMohamed Amjath, Shagufta Henna. 427-431 [doi]
- Software Security Testing Lifecycle for Automotive ProductsAnupriya Pandey, Kamal Singh. 432-436 [doi]
- Asset-Centric Threat Modeling for AI-Based SystemsJan von der Assen, Jamo Sharif, Chao Feng, Christian Killer, Gérôme Bovet, Burkhard Stiller. 437-444 [doi]
- Third-party Cloud Risk ManagementBreno Silva Pinto, Lucas Cioffi, Felipe Espósito. 445-451 [doi]
- Zero to Trust? Bringing Application-Level Intelligence at Scale to Detection EngineeringFatih Gey, Cédric Hébert, Holger Mack. 452-457 [doi]
- Towards Live Detection of Ransomware AttacksKumar Thummapudi, Rajendra V. Boppana, Palden Lama. 458-465 [doi]
- DefenceRank - Ranking Based Attack Graph Analysis and Defence PrioritizationRajendra Shivaji Patil, Markus Dypbukt Källman, Viktoria Fodor. 466-473 [doi]
- On the ISO Compliance of Model-Based Risk Assessment for Autonomous Cyber-Physical Production SystemsMaryam Zahid, Alessio Bucaioni, Francesco Flammini. 474-479 [doi]
- The Need for Cyber-Resilience in Complex SystemsSezen Acur, Teun Hendriks. 480-485 [doi]
- A Lightweight Firmware Resilience Engine for IoT Devices Leveraging Minimal Processor FeaturesUtku Budak, Fabrizio De Santis, Georg Sigl. 486-491 [doi]
- Using a Sensor-Health-Aware Resilient Fusion for Localization in the Presence of GPS Spoofing AttacksSamin Moosavi, Isabel Moore, Swaminathan Gopalswamy. 498-505 [doi]
- Identifying Novelty in Network TrafficJoshua Sylvester, Rogério de Lemos. 506-511 [doi]
- Situational Awareness Scoring System in Cyber Range PlatformsAmalia Damianou, Mariana S. Mazi, Georgios Rizos, Antonis Voulgaridis, Konstantinos Votis. 520-525 [doi]
- Cybersecurity as a Backbone for SustainabilityGohar Sargsyan. 526-530 [doi]
- Assessment of the Impact of Cyber-Attacks and Security Breaches in Diagnostic Systems on the Healthcare SectorKushal Srivastava, Katja Faist, Benjamin Lickert, Karen Neville, Nora McCarthy, Mirjam Fehling-Kaschek, Alexander Stolz. 531-536 [doi]
- The Affordability of Cybersecurity Costs in Developing Countries: A Systematic ReviewChinazunwa Uwaoma, Ayush Enkhtaivan. 545-550 [doi]
- The Effect of Privacy Concerns, Interaction, Trust, Age, and Gender on Self-Disclosure Behaviours on Social Networking SitesAlexis Coca, Fudong Li, Stavros Shiaeles, Deha Wu, Fan Liu. 551-556 [doi]
- Strengthening the Digital Ecosystem: Effects of the Cyber Resilience Act (CRA) on Open-Source SoftwareMatija Kikelj, Ivan Sabic. 557-561 [doi]
- Designing Trustworthy Decentralized Cross-Chain Marketplaces: A 6G Network of Networks PerspectiveLalita Jagadeesan, Shushu Liu, Lizette Velázquez. 562-569 [doi]
- Strengthening Cybersecurity Certifications Through Robust Chain of Custody PracticesJasmin Cosic, Admir Jukan, Miroslav Baca. 570-574 [doi]
- Investigating Cyber Risks in a Surgical Process for Healthcare Cyber ResilienceMahdad Pourmadadkar, Marianna Lezzi, Ali Aghazedeh Ardebili. 575-580 [doi]
- Building a Use Case-Driven Adversarial Threat Matrix: A Comprehensive ApproachProdromos Kiriakidis, Efi Kafali, Georgios Rizos, Antonis Voulgaridis, Theodoros Semertzidis, Stephane Gazut, Petros Daras, Konstantinos Votis. 587-592 [doi]
- Unraveling the Threat Landscape of CPS: Modbus TCP Vulnerabilities in the Era of I4.0George Lazaridis, Anastasios Drosou, Periklis Chatzimisios, Dimitrios Tzovaras. 593-598 [doi]
- Vehicular Network Security Against RF Jamming: An LSTM Detection SystemMubashir Murshed, Afrin Jubaida, Robson E. De Grande, Glaucio H. S. Carvalho. 599-604 [doi]
- From Data to Defense: Real-Time Detection of Botnets in IoT Using LSTM Networksshadi sadeghpour, Farhath Zareen, William A. Johnson. 605-611 [doi]
- Toward a Unified Security Framework for Digital Twin ArchitecturesSani M. Abdullahi, Sanja Lazarova-Molnar. 612-617 [doi]
- Secure AI/ML-Based Control in Intent-Based Management SystemLeyli Karaçay, Ahmet Cihat Baktir, Ramin Fuladi, Elham Dehghan Biyar, Ömer Faruk Tuna, Ipek Arikan. 618-623 [doi]
- Enhancing Cyber-Physical Security: Integrating Virtual Fences Within Digital TwinsAlì Aghazadeh Ardebili, Antonella Longo, Antonio Ficarella. 630-637 [doi]
- Lightweight Testbed for IEC61162-450-Related Cyber Security ResearchGabor Visky, Sokratis Katsikas, Olaf Maennel. 638-643 [doi]
- Hybrid Cybersecurity Research and Education Environment for Maritime SectorGabor Visky, Aleksei Siganov, Muaan ur Rehman, Risto Vaarandi, Hayretdin Bahsi, Leonidas Tsiopoulos. 644-651 [doi]
- Cybersecurity for Safety: Risk Assessment of Autonomous Cyber-Physical SystemsStefano Perone, Luca Faramondi, Simone Guarino, Roberto Setola, Martina Nobili, Francesco Flammini, Franca Corradini. 652-657 [doi]
- DSCS: Towards an Extensible Secure Decentralised Distributed Computation ProtocolAlexander Dalton, David Thomas, Peter Cheung. 658-663 [doi]
- A Novel Approach for Securing Federated Learning: Detection and Defense Against Model Poisoning AttacksGiovanni Maria Cristiano, Salvatore D'Antonio, Federica Uccello. 664-669 [doi]
- Secure and Transparent Data Sharing Among Connected Devices: Integrating Data Spaces and ProvenanceRoberto Nardone, Alfredo Petruolo, Federica Uccello. 670-675 [doi]
- Enhancing Healthcare Data Confidentiality through Decentralized TEE AttestationSalvatore D'Antonio, Jonah Giglio, Giovanni Mazzeo, Federica Uccello, Teresa Mannarino. 676-681 [doi]
- Simplifying Differential Privacy for Non-Experts: The ENCRYPT Project ApproachStelios Erotokritou, Ioannis Giannoulakis, Emmanouil Kafetzakis, Konstantinos Kaltakis. 682-687 [doi]
- ZADIG: A novel Extended Detection and Response SystemStefano Perone, Luca Faramondi, Simone Guarino, Martina Nobili, Roberto Setola, Ernesto Del Prete, Giovanni Patruno, Luca Piccirillo, Annunziata Laurenda. 688-693 [doi]
- Towards GPU Accelerated FHE ComputationsOrion Papadakis, Michail Papadimitriou, Athanasios Stratikopoulos, Maria Xekalaki, Juan Fumero, Nikos Foutris, Christos Kotselidis. 694-699 [doi]
- Towards a Generic Knowledge Graph Construction Framework for Privacy AwarenessChristina Karalka, Georgios Meditskos, Maria Papoutsoglou 0001, Nick Bassiliades. 700-705 [doi]
- Active Honey Files for Ransomware Encryption MitigationIoannis Stamelos, George Hatzivasilis, Sotiris Ioannidis. 706-713 [doi]
- Adversarial Attacks in Intrusion Detection Systems: Triggering False Alarms in Connected and Autonomous VehiclesFatimah Aloraini, Amir Javed. 714-719 [doi]
- Towards Developing an Asset-Criticality Identification Framework in Smart GridsYazeed Alrowaili, Neetesh Saxena, Pete Burnap. 720-725 [doi]
- Foundations for Modelling Conscientious Attacking in Electromagnetic CyberspaceNigel Davies, Huseyin Dogan, Duncan Ki-Aries, Nan Jiang, Chris Williams 0001. 726-731 [doi]
- The Impact of GPS Interference in the Middle EastVasilis Ieropoulos. 732-736 [doi]
- Synthetic Data for Identifying Inclusive Language (Case Study: Job Descriptions in Italian)Tommaso Romano, Fatemeh Mohammadi, Paolo Ceravolo. 737-742 [doi]
- Active Learning Methodology in LLMs Fine-TuningPaolo Ceravolo, Fatemeh Mohammadi, Marta Annamaria Tamborini. 743-749 [doi]
- Cyber Resilience in OT: Characteristics and Security ChallengesMarius Cotiga, Jens Myrup Pedersen, Edlira Dushku. 750-756 [doi]
- Framework for Quantitative Evaluation of Resilience Solutions: An Approach to Determine the Value of Resilience for a Particular SiteMark R. Weimar. 757-762 [doi]
- PENTEST-AI, an LLM-Powered Multi-Agents Framework for Penetration Testing Automation Leveraging Mitre AttackStanislas G. Bianou, Rodrigue G. Batogna. 763-770 [doi]
- Taxonomy of Cyber Risk Mitigation Cost Benefit Analysis Methods for Energy InfrastructureYvonne Hwei-Syn Kam, Kevin D. Jones, Kimberly Tam, Robert Rawlinson-Smith. 771-776 [doi]
- AI-Driven Anomaly and Intrusion Detection in Energy Systems: Current Trends and Future DirectionGeorgios Andronikidis, Charis Eleftheriadis, Zisis Batzos, Konstantinos Kyranou, Nikolaos Maropoulos, Gohar Sargsyan, Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis. 777-782 [doi]
- AI4COLLAB: An AI-based Threat Information Sharing PlatformChristos Dalamagkas, Dimitrios Christos Asimopoulos, Panagiotis I. Radoglou-Grammatikis, Nikolaos Maropoulos, Thomas Lagkas, Vasileios Argyriou, Gohar Sargsyan, Panagiotis G. Sarigiannidis. 783-788 [doi]
- SDN-Based Reconfiguration of Distributed and Cooperative Microgrid Control Systems for Mitigating Synchronization AttacksAurélie Kpoze, Abdelkader Lahmadi, Isabelle Chrisment, Jules Degila. 789-794 [doi]
- Towards a Reputational-Based Trustworthy Archaeological Information SystemMargherita Bottoni, Emanuele Bellini 0001, Emeri Farinetti. 795-800 [doi]
- Transitioning SSH European Research Infrastructures to Critical Infrastructure Through ResilienceEmanuele Bellini 0001, Emiliano Degl'Innocenti. 801-806 [doi]
- SoK: Autonomic Computing Based Mehods for ICS/SCADA and IIoT SecurityChristopher Rouff, Ali Tekeoglu. 807-812 [doi]
- Autonomic Passive IT-OT Device Classification in ICS/SCADA NetworksBenny Rubin, Ali Tekeoglu, Christopher Rouff. 813-818 [doi]
- SecureExecutor: An Automated Way to Leverage SCONE to Enhance Application SecurityChristos Spyridakis, Angeliki Aktypi, Thomas Kyriakakis, Sotiris Ioannidis. 827-832 [doi]
- Composite Inspection and Certification (CIC) System for Cybersecuity Assessment of ICT Products, Services, and ProcessesSpyridon Papastergiou, Shareeful Islam, Eleni-Maria Kalogeraki, Argyro Chatzopoulou, Panagiotis Bountakas, Konstantinos Pournaras, Sreedevi Beena, Nineta Polemi. 833-838 [doi]
- Quantifying the Odds in Real World Attack ScenariosPaul Tavolato, Robert Luh, Sebastian Eresheim, Simon Gmeiner, Sebastian Schrittwieser. 845-852 [doi]
- Onto Hunt - A Semantic Reasoning Approach to Cyber Threat Hunting with Indicators of BehaviourRobert Andrew Chetwyn, Martin Eian, Audun Jøsang. 853-859 [doi]
- DID:RING: Ring Signatures Using Decentralised Identifiers For Privacy-Aware Identity ProofDimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Christos Chrysoulas, Craig Thomson, Baraq Ghaleb. 866-871 [doi]
- Challenges of Digital Investigations in Nowadays Communication NetworksDaniel Spiekermann, Jörg Keller 0001. 872-877 [doi]
- Forensic Communication Analysis: Challenges and OpportunitiesJian Xi, Lukas Jaeckel, Michael Spranger, Melanie Siegel, Dirk Labudde. 878-883 [doi]
- Static Power Consumption as a New Side-Channel Analysis Threat to Elliptic Curve Cryptography ImplementationsIevgen Kabin, Zoya Dyka, Alkistis Aikaterini Sigourou, Peter Langendoerfer. 884-889 [doi]
- Communication Architecture Under Siege: An In-depth Analysis of Fault Attack Vulnerabilities and CountermeasuresHongwei Zhao, Vianney Lapôtre, Guy Gogniat. 890-896 [doi]
- On-line Anomaly Detection and Qualification of Random Bit StreamsCesare Caratozzolo, Valeria Rossi, Kamil Witek, Alberto Trombetta, Massimo Caccia. 897-904 [doi]
- Stealth Attacks on PCBs: An Experimental Plausibility AnalysisIevgen Kabin, Jan Schäffner, Alkistis Aikaterini Sigourou, Dmytro Petryk, Zoya Dyka, Dominik Klein, Sven Freud, Peter Langendoerfer. 905-912 [doi]
- FPGA-Based Cloud Security Solutions for 5G NetworksMarios Papadopoulos, Kostas Lampropoulos, Paris Kitsos. 913-918 [doi]
- Minimizing Area Footprint of UAV Communication Security Using FPGAsEvangelia Konstantopoulou, George S. Athanasiou, Nicolas Sklavos 0001. 919-924 [doi]