Abstract is missing.
- Effects of Organizational Cyber Security Culture Across the Energy Sector Supply ChainSusanne Barkhald Sandberg, Aida Akbarzadeh, Vasileios Gkioulos. 5-24 [doi]
- METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to CyberattacksLennart Bader, Eric Wagner 0003, Martin Henze, Martin Serror. 25-45 [doi]
- Threat Analysis in Dairy Farming 4.0Karl Jonatan Due Vatn, Georgios Kavallieratos, Sokratis K. Katsikas. 46-63 [doi]
- Overview of Social Engineering Protection and Prevention MethodsKonstantinos Kontogeorgopoulos, Kyriakos Kritikos. 64-83 [doi]
- Skade - A Challenge Management System for Cyber Threat HuntingTeodor Sommestad, Henrik Karlzén, Hanna Kvist, Hanna Gustafsson. 84-103 [doi]
- On the Usage of NLP on CVE Descriptions for Calculating RiskThrasyvoulos Giannakopoulos, Konstantinos N. Maliatsos. 104-123 [doi]
- Evaluation of an OPC UA-Based Access Control Enforcement ArchitectureBjörn Leander, Aida Causevic, Hans Hansson, Tomas Lindström. 124-144 [doi]
- HoneyEVSE: An Honeypot to Emulate Electric Vehicle Supply EquipmentsMassimiliano Baldo, Tommaso Bianchi, Mauro Conti, Alessio Trevisan, Federico Turrin. 145-159 [doi]
- Not Only Security and Privacy: The Evolving Ethical and Legal Challenges of E-CommerceMichal Choras, Aleksandra Pawlicka, Dagmara Jaroszewska-Choras, Marek Pawlicki. 167-181 [doi]
- Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Against Synthetic DataFlorent Guépin, Matthieu Meeus, Ana-Maria Cretu 0002, Yves-Alexandre de Montjoye. 182-198 [doi]
- Patient-Centric Health Data Sovereignty: An Approach Using Proxy Re-EncryptionBruno Rodrigues, Ivone Amorim, Ivan Silva, Alexandra Mendes. 199-215 [doi]
- PrivacySmart: Automatic and Transparent Management of Privacy PoliciesCristòfol Daudén-Esmel, Jordi Castellà-Roca, Alexandre Viejo, Eduard Josep Bel-Ribes. 216-231 [doi]
- Try On, Spied On?: Privacy Analysis of Virtual Try-On Websites and Android AppsAbdelrahman Ragab, Mohammad Mannan, Amr M. Youssef. 232-248 [doi]
- Integrally Private Model Selection for Support Vector MachineSaloni Kwatra, Ayush K. Varshney, Vicenç Torra. 249-259 [doi]
- Differentially Private Traffic Flow Prediction Using Transformers: A Federated ApproachSargam Gupta, Vicenç Torra. 260-271 [doi]
- s-Anonymization for Smart Meter DataCarolin Brunn, Saskia Nuñez von Voigt, Florian Tschorsch. 272-282 [doi]
- Towards Real-World Private Computations with Homomorphic Encryption: Current Solutions and Open ChallengesMichela Iezzi, Carsten Maple, Andrea Leonetti. 283-298 [doi]
- AddShare: A Privacy-Preserving Approach for Federated LearningBernard Asare, Paula Branco, Iluju Kiringa, Tet Hin Yeap. 299-309 [doi]
- Secure Multiparty Sampling of a Biased Coin for Differential PrivacyAmir Zarei, Staal Amund Vinterbo. 310-320 [doi]
- Transaction Fee Mechanism for Order-Sensitive Blockchain-Based ApplicationsMohammad Sadegh Nourbakhsh, Feng Hao 0001, Arshad Jhumka. 327-343 [doi]
- Comparison of Ethereum Smart Contract Analysis and Verification MethodsVincent Happersberger, Frank-Walter Jäkel, Thomas Knothe, Yvonne Anne Pignolet, Stefan Schmid 0001. 344-358 [doi]
- Chaussette: A Symbolic Verification of Bitcoin ScriptsVincent Jacquot, Benoit Donnet. 359-375 [doi]
- A Simple Single Slot Finality Protocol for EthereumFrancesco D'Amato, Luca Zanolini. 376-393 [doi]
- Timely Identification of Victim Addresses in DeFi AttacksBahareh Parhizkari, Antonio Ken Iannillo, Christof Ferreira Torres, Sebastian Banescu, Joseph Jiaqi Xu, Radu State. 394-410 [doi]
- On the (Not So) Surprising Impact of Multi-Path Payments on Performance And Privacy in the Lightning NetworkCharmaine Ndolo, Florian Tschorsch. 411-427 [doi]
- Creating Privacy Policies from Data-Flow DiagramsJens Leicht, Marvin Wagner, Maritta Heisel. 433-453 [doi]
- Up-to-Date Threat Modelling for Soft Privacy on Smart CarsMario Raciti, Giampaolo Bella. 454-473 [doi]
- Security and Privacy for Mobile Crowdsensing: Improving User Relevance and PrivacyCihan Eryonucu, Panos Papadimitratos. 474-493 [doi]
- Review on Privacy and Trust Methodologies in Cloud ComputingStavros Simou, Aikaterini-Georgia Mavroeidi, Christos Kalloniatis. 494-505 [doi]