Abstract is missing.
- Edge and Fog Computing in Critical Infrastructures: Analysis, Security Threats, and Research ChallengesPietro Tedeschi, Savio Sciancalepore. 1-10 [doi]
- ANTIBIOTIC 2.0: A Fog-based Anti-Malware for Internet of ThingsMichele De Donno, Juan Manuel Donaire Felipe, Nicola Dragoni. 11-20 [doi]
- SeCoNetBench: A modular framework for Secure Container Networking BenchmarksAmr Osman, Simon Hanisch, Thorsten Strufe. 21-28 [doi]
- Towards Multi-party Policy-based Access Control in Federations of Cloud and Edge MicroservicesDavy Preuveneers, Wouter Joosen. 29-38 [doi]
- An Auditing Framework for Vulnerability Analysis of IoT SystemIbrahim Nadir, Zafeer Ahmad, Haroon Mahmood, Ghalib Asadullah Shah, Farrukh Shahzad, Muhammad Umair, Hassam Khan, Usman Gulzar. 39-47 [doi]
- oneM2M Architecture Based Secure MQTT Binding in Mbed OSAhsan Muhammad, Bilal Afzal, Bilal Imran, Asim Tanwir, Ali Hammad Akbar, Ghalib A. Shah. 48-56 [doi]
- Network Reconnaissance and Vulnerability Excavation of Secure DDS SystemsRuffin White, Gianluca Caiazza, Chenxu Jiang, Xinyue Ou, Zhiyue Yang, Agostino Cortesi, Henrik I. Christensen. 57-66 [doi]
- Realistic Cybersecurity Training via Scenario Progression ManagementRazvan Beuran, Takuya Inoue, Yasuo Tan, Yoichi Shinoda. 67-76 [doi]
- Becoming Invisible Hands of National Live-Fire Attack-Defense Cyber ExerciseJoonsoo Kim, YoungJae Maeng, Moonsu Jang. 77-84 [doi]
- Designing Serious Games for Cyber Ranges: A Socio-technical ApproachMazaher Kianpour, Stewart Kowalski, Erjon Zoto, Christopher Frantz, Harald Øverby. 85-93 [doi]
- Cybersecurity Experimentation at Program Scale: Guidelines and Principles for Future TestbedsStephen Schwab, Erik Kline. 94-102 [doi]
- Pedagogical Aspects of Cyber Security ExercisesMika Karjalainen, Tero Kokkonen, Samir Puuska. 103-108 [doi]
- Why Johnny Fails to Protect his PrivacyNina Gerber, Verena Zimmermann, Melanie Volkamer. 109-118 [doi]
- Don't Punish all of us: Measuring User Attitudes about Two-Factor AuthenticationJonathan Dutson, Danny Allen, Dennis Eggett, Kent E. Seamons. 119-128 [doi]
- A Survey on Developer-Centred SecurityMohammad Tahaei, Kami Vaniea. 129-138 [doi]
- How Could Serious Games Support Secure Programming? Designing a Study Replication and InterventionManuel Maarek, Léon McGregor, Sandy Louchart, Ross McMenemy. 139-148 [doi]
- Vision: Shining Light on Smart Homes - Supporting Informed Decision-Making of End UsersVerena Zimmermann, Ernestine Dickhaut, Paul Gerber, Joachim Vogt 0002. 149-153 [doi]
- Vision: Exploring Challenges and Opportunities for Usable Authentication in the Smart HomeSarah Prange, Emanuel von Zezschwitz, Florian Alt. 154-158 [doi]
- Comparative Analysis of Three Language Spheres: Are Linguistic and Cultural Differences Reflected in Password Selection Habits?Keika Mori, Takuya Watanabe 0001, Yunao Zhou, Ayako Akiyama Hasegawa, Mitsuaki Akiyama, Tatsuya Mori. 159-171 [doi]
- Detecting Misalignments between System Security and User Perceptions: A Preliminary Socio-technical Analysis of an E2E email Encryption SystemBorce Stojkovski, Itzel Vázquez Sandoval, Gabriele Lenzini. 172-181 [doi]
- A Review of Human- and Computer-Facing URL Phishing FeaturesKholoud Althobaiti, Ghaidaa Rummani, Kami Vaniea. 182-191 [doi]
- 2 Fast 2 Secure: A Case Study of Post-Breach Security ChangesAlbese Demjaha, Tristan Caulfield, M. Angela Sasse, David J. Pym. 192-201 [doi]
- Feature Selection Strategies for HTTP Botnet Traffic DetectionIvan Letteri, Giuseppe Della Penna, Pasquale Caianiello. 202-210 [doi]
- Recessive Social Networking: Preventing Privacy Leakage against Reverse Image SearchJiajie Zhang, Bingsheng Zhang, Jiancheng Lin. 211-219 [doi]
- Generation of Static YARA-Signatures Using Genetic AlgorithmAlexander Zhdanov. 220-228 [doi]
- AutoAttacker: A reinforcement learning approach for black-box adversarial attacksIlias Tsingenopoulos, Davy Preuveneers, Wouter Joosen. 229-237 [doi]
- A Semi-supervised Learning Methodology for Malware Categorization using Weighted Word EmbeddingsHugo Leonardo Duarte-Garcia, Carlos Domenick Morales-Medina, Aldo Hernandez-Suarez, Gabriel Sanchez-Perez, Karina Toscano-Medina, Héctor Pérez-Meana, Victor Sanchez. 238-246 [doi]
- Malware Detection Using 1-Dimensional Convolutional Neural NetworksArindam Sharma, Pasquale Malacaria, M. H. R. Khouzani. 247-256 [doi]
- Towards Fully Integrated Real-time Detection Framework for Online Contents Analysis - RED-Alert ApproachSyed Naqvi, Ian Williams, Sean Enderby, Péter Pollner, Daniel Abel, Berta Biescas, Oscar Garcia, Monica Florea, Cristi Potlog. 257-263 [doi]
- CRC-PUF: A Machine Learning Attack Resistant Lightweight PUF ConstructionElena Dubrova, Oscar Näslund, Bernhard Degen, Anders Gawell, Yang Yu. 264-271 [doi]
- Adversarial Out-domain Examples for Generative ModelsDario Pasquini, Marco Mingione, Massimo Bernaschi. 272-280 [doi]
- Exploiting the Auto-Encoder Residual Error for Intrusion DetectionGiuseppina Andresini, Annalisa Appice, Nicola Di Mauro, Corrado Loglisci, Donato Malerba. 281-290 [doi]
- Using a Deep-Learning Approach for Smart IoT Network Packet AnalysisJohn Yoon. 291-299 [doi]
- Eclipsing Ethereum Peers with False FriendsSebastian A. Henningsen, Daniel Teunis, Martin Florian, Björn Scheuermann 0001. 300-309 [doi]
- Empirically Analyzing Ethereum's Gas MechanismRenlord Yang, Toby Murray, Paul Rimba, Udaya Parampalli. 310-319 [doi]
- Resolving the Multiple Withdrawal Attack on ERC20 TokensReza Rahimian, Shayan Eskandari, Jeremy Clark. 320-329 [doi]
- MProve: A Proof of Reserves Protocol for Monero ExchangesArijit Dutta, Saravanan Vijayakumaran. 330-339 [doi]
- Towards Automatically Penalizing Multimedia Breaches (Extended Abstract)Easwar Vivek Mangipudi, Krutarth Rao, Jeremy Clark, Aniket Kate. 340-346 [doi]
- Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based AttacksElias Rohrer, Julian Malliaris, Florian Tschorsch. 347-356 [doi]
- Temporary Censorship Attacks in the Presence of Rational MinersFredrik Winzer, Benjamin Herd, Sebastian Faust. 357-366 [doi]
- Erasing Data from Blockchain NodesMartin Florian, Sebastian A. Henningsen, Sophie Beaucamp, Björn Scheuermann 0001. 367-376 [doi]
- Is Stellar As Secure As You Think?Minjeong Kim, Yujin Kwon, Yongdae Kim. 377-385 [doi]
- Agent-Based Simulations of Blockchain protocols illustrated via Kadena's ChainwebTarun Chitra, Monica Quaintance, Stuart Haber, Will Martino. 386-395 [doi]
- TULIP: A Fully Incentive Compatible Blockchain Framework Amortizing Redundant CommunicationOguzhan Ersoy, Zekeriya Erkin, Reginald L. Lagendijk. 396-405 [doi]
- Geost Botnet. Operational Security Failures of a New Android Banking ThreatSebastián García, María José Erquiaga, Anna Shirokova, Carlos García Garino. 406-409 [doi]
- Youth Hackers and Adult Hackers in South Korea: An Application of Cybercriminal ProfilingSinchul Back, Jennifer LaPrade, Lana Shehadeh, Minju Kim. 410-413 [doi]
- Master of Sheets: A Tale of Compromised Cloud DocumentsJeremiah Onaolapo, Martin Lazarov, Gianluca Stringhini. 414-422 [doi]
- Iniquitous Cord-Cutting: An Analysis of Infringing IPTV ServicesPrakhar Pandey, Maxwell Aliapoulios, Damon McCoy. 423-432 [doi]
- CARONTE: Crawling Adversarial Resources Over Non-Trusted, High-Profile EnvironmentsMichele Campobasso, Pavlo Burda, Luca Allodi. 433-442 [doi]
- Cascade and Chain Effects in Big Data Cybercrime: Lessons from the TalkTalk hackMaria Grazia Porcedda, David S. Wall. 443-452 [doi]
- A Qualitative Evaluation of Two Different Law Enforcement Approaches on Dark Net MarketsCerys Bradley, Gianluca Stringhini. 453-463 [doi]
- Machete: Dissecting the Operations of a Cyber Espionage Group in Latin AmericaVeronica Valeros, Maria Rigaki, Sebastian Garcia. 464-473 [doi]
- Beneath the Dark Web: Excavating the Layers of Cybercrime's Underground EconomyJonathan Lusthaus. 474-480 [doi]
- Inside out: Characterising Cybercrimes Committed Inside and Outside the WorkplaceAlice Hutchings, Ben Collier. 481-490 [doi]