Abstract is missing.
- An Opportunity-Based Approach to Information Security RiskDinh Uy Tran, Sigrid Haug Selnes, Audun Jøsang, Janne Merete Hagen. 7-25 [doi]
- A Methodology for Cybersecurity Risk Assessment in Supply ChainsBetul Gokkaya, Leonardo Aniello, Erisa Karafili, Basel Halak. 26-41 [doi]
- IM-DISCO: Invariant Mining for Detecting IntrusionS in Critical OperationsGuilherme Saraiva, Filipe Apolinário, Miguel L. Pardal. 42-58 [doi]
- Labeling NIDS Rules with MITRE ATT &CK Techniques Using ChatGPTNir Daniel, Florian Klaus Kaiser, Anton Dzega, Aviad Elyashar, Rami Puzis. 76-91 [doi]
- User Behavior Analysis for Malware DetectionValentina Dumitrasc, René Serral-Gracià. 92-110 [doi]
- Balancing XAI with Privacy and Security ConsiderationsChristoforos N. Spartalis, Theodoros Semertzidis, Petros Daras. 111-124 [doi]
- Utilizing the Ensemble Learning and XAI for Performance Improvements in IoT Network Attack DetectionChathuranga Sampath Kalutharage, Xiaodong Liu 0002, Christos Chrysoulas, Oluwaseun Bamgboye. 125-139 [doi]
- C-TAR: A Compositional Threat Analysis and Risk Assessment Method for Infrastructure-Based Autonomous DrivingMohamed AbdElSalam, Simon Greiner, Oum-El-Kheir Aktouf, Annabelle Mercier. 159-175 [doi]
- The VOCODES Kill Chain for Voice Controllable DevicesSergio Esposito, Daniele Sgandurra, Giampaolo Bella. 176-197 [doi]
- DETONAR-Light: An IoT Network Intrusion Detection Using DETONAR without a Sniffer NetworkVictoria Bull, Niclas Finne, Andrea Agiollo, Pallavi Kaliyar, Luca Pajola, Thiemo Voigt, Mauro Conti. 198-213 [doi]
- SigIL: A Signature-Based Approach of Malware Detection on Intermediate LanguageGiancarlo Fortino, Claudia Greco, Antonella Guzzo, Michele Ianni. 256-266 [doi]
- Forkfuzz: Leveraging the Fork-Awareness in Coverage-Guided FuzzingMarcello Maugeri, Cristian Daniele, Giampaolo Bella. 291-308 [doi]
- Trust Assumptions in Voting SystemsKristjan Krips, Nikita Snetkov, Jelizaveta Vakarjuk, Jan Willemson. 309-329 [doi]
- Enhancing Security Assurance in Software Development: AI-Based Vulnerable Code Detection with Static AnalysisSampath Rajapaksha, Janaka Senanayake, Harsha Kalutarage, M. Omar Al-Kadri. 341-356 [doi]
- Execution at RISC: Stealth JOP Attacks on RISC-V ApplicationsLoïc Buckwell, Olivier Gilles, Daniel Gracia Pérez, Nikolai Kosmatov. 377-391 [doi]
- Modeling Obfuscation Stealth Through Code ComplexitySebastian Schrittwieser, Elisabeth Wimmer, Kevin Mallinger, Patrick Kochberger, Caroline Lawitschka, Sebastian Raubitzek, Edgar R. Weippl. 392-408 [doi]
- ZeekFlow: Deep Learning-Based Network Intrusion Detection a Multimodal ApproachDimitrios Giagkos, Orestis Kompougias, Antonis Litke, Nikolaos Papadakis. 409-425 [doi]
- FedREVAN: Real-time DEtection of Vulnerable Android Source Code Through Federated Neural Network with XAIJanaka Senanayake, Harsha Kalutarage, Andrei Petrovski 0001, M. Omar Al-Kadri, Luca Piras 0003. 426-441 [doi]
- Finding Server-Side Endpoints with Static Analysis of Client-Side JavaScriptDaniil Sigalov, Dennis Gamayunov. 442-458 [doi]
- The Nonce-nce of Web Security: An Investigation of CSP Nonces ReuseMatteo Golinelli, Francesco Bonomi, Bruno Crispo. 459-475 [doi]
- DNS Dependencies as an Expression of the Digital Divide: The Example of AustraliaNiousha Nazemi, Omid Tavallaie, Albert Y. Zomaya, Ralph Holz. 496-509 [doi]
- Towards Security Transparency of Autonomous Systems on the InternetShyam Krishna Khadka, Ralph Holz, Cristian Hesselman. 510-513 [doi]
- Privacy-Preserving Object Recognition with Explainability in Smart SystemsWisam Abbasi, Paolo Mori, Andrea Saracino. 519-534 [doi]
- Verifiable Fairness: Privacy-preserving Computation of Fairness for Machine Learning SystemsEhsan Toreini, Maryam Mehrnezhad, Aad van Moorsel. 569-584 [doi]
- NASimEmu: Network Attack Simulator & Emulator for Training Agents Generalizing to Novel ScenariosJaromír Janisch, Tomás Pevný, Viliam Lisý. 589-608 [doi]
- Can Inputs' Reconstruction Information Be Coded into Machine Learning Model's Outputs?Kazuki Iwahana, Osamu Saisho, Takayuki Miura, Akira Ito. 665-682 [doi]
- Towards a Practical Defense Against Adversarial Attacks on Deep Learning-Based Malware Detectors via Randomized SmoothingDaniel Gibert, Giulio Zizzo, Quan Le. 683-699 [doi]
- Backdoor Attacks Leveraging Latent Representation in Competitive LearningKazuki Iwahana, Naoto Yanai, Toru Fujiwara. 700-718 [doi]
- Simulating Deception for Web Applications Using Reinforcement LearningAndrei Kvasov, Merve Sahin, Cédric Hébert, Anderson Santana de Oliveira. 719-737 [doi]
- The Road Towards Autonomous Cybersecurity Agents: Remedies for Simulation EnvironmentsMartin Drasar, Ádám Ruman, Pavel Celeda, Shanchieh Jay Yang. 738-749 [doi]
- Mitigating Gradient Inversion Attacks in Federated Learning with Frequency TransformationChamath Palihawadana, Nirmalie Wiratunga, Harsha Kalutarage, Anjana Wijekoon. 750-760 [doi]
- Network Intrusion Detection by Variational Component-Based Feature Saliency Gaussian Mixture ClusteringXin Hong, Zafeirios C. Papazachos, Jesús Martínez del Rincón, Paul Miller 0003. 761-772 [doi]