Abstract is missing.
- Multistep Cyberattacks Detection using a Flexible Multilevel System for Alerts and Events CorrelationElvira Castillo-Fernández, Jesús Esteban Díaz Verdejo, Rafael Estepa Alonso, Antonio Jose Estepa Alonso, Javier Muñoz-Calle, Germán Madinabeitia. 1-6 [doi]
- An Evaluation of Information Flows in Digital Euro Transactions Using Contextual Integrity TheoryFrédéric Tronnier, Patrick Biker, Erik Baur, Sascha Löbner. 7-12 [doi]
- New Tricks to Old Codes: Can AI Chatbots Replace Static Code Analysis Tools?Omer Said Ozturk, Emre Ekmekcioglu, Orçun Çetin, Budi Arief, Julio Hernandez-Castro. 13-18 [doi]
- Exposed-mode of Wormhole Attack in Opportunistic Mobile Networks: Impact Study and AnalysisSidra Aslam, Ala Altaweel, Ibrahim Kamel. 19-25 [doi]
- Acceptance Factors and Obstacles for Cryptocurrency AdoptionPeter Hamm, Sebastian Pape 0001, David Harborth. 26-33 [doi]
- A Framework for Advanced Persistent Threat Attribution using Zachman OntologyVenkata Sai Charan Putrevu, Hrushikesh Chunduri, Mohan Anand Putrevu, Sandeep K. Shukla. 34-41 [doi]
- Useful Cyber Threat Intelligence Relation Retrieval Using Transfer LearningChia-Mei Chen, Fang-Hsuan Hsu, Jenq-Neng Hwang. 42-46 [doi]
- Ontology-based Framework for Boundary Verification of Safety and Security Properties in Industrial Control SystemsChibuzo Ukegbu, Ramesh Neupane, Hoda Mehrpouyan. 47-52 [doi]
- Cyber Informedness: A New Metric using CVSS to Increase Trust in Intrusion Detection SystemsRobin Duraz, David Espes, Julien Francq, Sandrine Vaton. 53-58 [doi]
- Investigating the Availability of Child Sexual Abuse Materials in Dark Web Markets: Evidence Gathered and Lessons LearnedYichao Wang, Budi Arief, Virginia Nunes Leal Franqueira, Anna Grace Coates, Caoilte Ó Ciardha. 59-64 [doi]
- HTTP Cyberattacks Detection through Automatic Signature Generation in multi-site IoT DeploymentsAgustín Walabonso Lara Romero, Juan Antonio Ternero Muñiz, Rafael Estepa Alonso, Antonio Jose Estepa Alonso, Fernando Ruiz Robles, Jesús Esteban Díaz Verdejo. 65-70 [doi]
- Towards Detecting Anomalies in Log-Event Sequences with Deep Learning: Open Research ChallengesPatrick Himler, Max Landauer, Florian Skopik, Markus Wurzenberger. 71-77 [doi]
- Towards detecting device fingerprinting on iOS with API function hookingKris Heid, Vincent Andrae, Jens Heider. 78-84 [doi]
- Privacy Preserving Data Analysis with the Encode, Shuffle, Analyse Architecture in Vehicular Data SharingSascha Löbner, Christian Gartner, Frédéric Tronnier. 85-91 [doi]
- Robustness of Image-Based Malware Classification Models trained with Generative Adversarial NetworksCiaran Reilly, Stephen O. Shaughnessy, Christina Thorpe. 92-99 [doi]
- CLOUDOSCOPE: Detecting Anti-Forensic Malware using Public Cloud EnvironmentsMordechai Guri. 100-107 [doi]
- ViSDM: A Liquid Democracy based Visual Data Marketplace for Sovereign Crowdsourcing Data CollectionVenkata Satya Sai Ajay Daliparthi, Nurul Momen, Kurt Tutschku, Miguel de Prado. 108-115 [doi]
- DGA Detection Using Similarity-Preserving Bloom EncodingsLasse Nitz, Avikarsha Mandal. 116-120 [doi]
- Effect of Power Conversion Efficiency of the RF Energy Harvester on the Security and Data Rate of the Self-Sustainable IoT DevicesFariborz Lohrabi Pour, Dong Sam Ha. 121-124 [doi]
- Improving Covert Channel Bandwidth by Variable-Length Exponent Re-Coding in Floating-Point RepresentationsJörg Keller 0001, Carina Heßeling. 125-128 [doi]
- Digital safety alarms - Exploring the understandings of the cybersecurity practice in Norwegian municipalitiesAlvhild Skjelvik, Arnstein Vestad. 129-133 [doi]
- Analysing the Impact of Gender Classification on Age EstimationPetra Grd, Ena Barcic, Igor Tomicic, Bogdan Okresa Duric. 134-137 [doi]
- Usability, Security, and Privacy Recommendations for Mobile Parental ControlVahiny Gnanasekaran, Katrien De Moor. 138-143 [doi]
- Cybercrime and Video Games: Exploring children's safety in the gaming environmentMatteo Curcio. 144-148 [doi]
- Collaboration between parents and children to raise cybersecurity awarenessFarzana Quayyum. 149-152 [doi]
- Exploratory and Explanation-Aware Network Intrusion Profiling using Subgroup Discovery and Complex Network AnalysisMartin Atzmueller, Sophia Sylvester, Rushed Kanawati. 153-158 [doi]
- RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware DetectionYashovardhan Sharma, Simon Birnbach, Ivan Martinovic. 159-166 [doi]
- Digital Energy Platforms Considering Digital Privacy and Security by Design PrinciplesUmit Cali, Marthe Fogstad Dynge, Ahmed Idries, Sambeet Mishra, Ivanko Dmytro, Naser Hashemipour, Murat Kuzlu. 167-173 [doi]
- Cybersecurity and Digital Privacy Aspects of V2X in the EV Charging StructureUmit Cali, Murat Kuzlu, Onur Elma, Osman Gazi Gucluturk, Ahmet Kilic, Ferhat Özgür Çatak. 174-180 [doi]
- Cyber-physical Hardening of the Digital Water InfrastructureUmit Cali, Ferhat Özgür Çatak, Zsolt György Balogh, Rita Ugarelli, Martin Gilje Jaatun. 181-188 [doi]
- Older adults and tablet computers: Adoption and the role of perceived threat of cyber attacksAnze Mihelic, Igor Bernik, Simon Vrhovec. 189-190 [doi]
- Crypto-agile Design and Testbed for QKD-NetworksJohanna Henrich, Andreas Heinemann, Martin Stiemerling, Fabian Seidl. 191-192 [doi]
- A Deep Learning-based Malware Traffic Classifier for 5G Networks Employing Protocol-Agnostic and PCAP-to-Embeddings TechniquesGeorgios Agrafiotis, Eftychia Makri, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras, Nikolaos Tsampieris. 193-194 [doi]
- In Alice and Bob, I trust?Allison Wylde. 195-196 [doi]