Abstract is missing.
- Computer-Aided Reverse Engineering of Protected SoftwareDaniele Canavese, Leonardo Regano, Antonio Lioy. 3-15 [doi]
- Using Statistical Model Checking for Cybersecurity AnalysisCarlos E. Budde. 16-32 [doi]
- A Need for Privacy-Assistive Technology in Notice and Consent Paradigm in IoTShukun Tokas, Gencer Erdogan. 35-49 [doi]
- Privacy-Preserving Cyber Threat Information Sharing Leveraging FL-Based Intrusion Detection in the Financial SectorPablo Fernández Saura, Juan Francisco Martínez Gil, Jorge Bernal Bernabé, Antonio F. Skarmeta. 50-64 [doi]
- Generative Methods for Out-of-distribution Prediction and Applications for Threat Detection and Analysis: A Short ReviewErica Coppolillo, Angelica Liguori, Massimo Guarascio 0001, Francesco Sergio Pisani, Giuseppe Manco 0001. 65-79 [doi]
- Distributed Filtering in Industrial NetworksManuel Cheminod, Luca Durante. 80-93 [doi]
- 6G Technologies: Key Features, Challenges, Security and Privacy IssuesNarges Arastouei. 94-109 [doi]
- Building Cross-language Corpora for Human Understanding of Privacy PoliciesFrancesco Ciclosi, Silvia Vidor, Fabio Massacci. 113-131 [doi]
- Governance Foundations for the European Cybersecurity CommunityAfonso Ferreira, Christina von Wintzingerode, Dirk Müllmann, Abdelmalek Benzekri, Pierre-Henri Cros, Indra Spiecker genannt Döhmann, Elvire Prochilo. 132-148 [doi]
- Building a Cybersecurity Awareness Program: Present and Prospective AspectsSunil Chaudhary, Vasileios Gkioulos. 149-160 [doi]
- Building European Cybersecurity Ecosystems: Lessons from the PastAljosa Pasic. 161-174 [doi]