Abstract is missing.
- Leveraging Blockchain Technology to Enhance Security and Privacy in the Internet of ThingsSokratis K. Katsikas. 5
- Toward Active and Passive Confidentiality Attacks on Cryptocurrency Off-chain NetworksUtz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid 0001, Christian Decker. 7-14 [doi]
- Backdooring Deep Learning Architectures: Threats and (some) OpportunitiesMauro Barni. 15-16
- AMNESIA: A Technical Solution towards GDPR-compliant Machine LearningChristoph Stach, Corinna Giebler, Manuela Wagner, Christian Weber 0005, Bernhard Mitschang. 21-32 [doi]
- Secure Ownership Transfer for the Internet of ThingsMartin Gunnarsson, Christian Gehrmann. 33-44 [doi]
- Host Fingerprinting for Web Servers AuthenticationEzio Lefons, Sebastiano Pizzutilo, Filippo Tangorra. 45-51 [doi]
- A Formal Approach for the Analysis of the XRP Ledger Consensus ProtocolLara Mauri, Stelvio Cimato, Ernesto Damiani. 52-63 [doi]
- Email Spoofing Attack Detection through an End to End Authorship Attribution SystemGiacomo Giorgi, Andrea Saracino, Fabio Martinelli. 64-74 [doi]
- Lightweight Authentication and Secure Communication Suitable for IoT DevicesSimona Buchovecká, Róbert Lórencz, Jirí Bucek, Filip Kodýtek. 75-83 [doi]
- CoRA: A Scalable Collective Remote Attestation Protocol for Sensor NetworksAïda Diop, Maryline Laurent, Jean Leneutre, Jacques Traoré. 84-95 [doi]
- Track Down Identity Leaks using Threat IntelligenceTimo Malderle, Sven Knauer, Martin Lang 0007, Matthias Wübbeling, Michael Meier 0001. 96-106 [doi]
- Assessing Testing Strategies for Access Control Systems: A Controlled ExperimentSaid Daoudagh, Francesca Lonetti, Eda Marchetti. 107-118 [doi]
- Secrecy and Authenticity Properties of the Lightning Network ProtocolHans Hüttel, Vilim Staroveski. 119-130 [doi]
- Privacy with Health Information Technologies: What Story Do Data Breaches in US Tell Us?Sylvestre Uwizeyemungu, Placide Poba-Nzaou. 131-141 [doi]
- Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization ToolVanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto. 142-151 [doi]
- Harmonized Group Mix for ITSMirja Nitschke, Christian Roth, Christian Hoyer, Dogan Kesdogan. 152-163 [doi]
- A Quantitative Study of Vulnerabilities in the Internet of Medical ThingsHervé Debar, Razvan Beuran, Yasuo Tan. 164-175 [doi]
- Speeding Up the Computation of Elliptic Curve Scalar Multiplication based on CRT and DRMMohammad Anagreh, Eero Vainikko, Peeter Laud. 176-184 [doi]
- External Contextual Factors in Information Security BehaviourDirk Snyman, Hennie A. Kruger. 185-194 [doi]
- A Homomorphic Proxy Re-authenticators based Efficient Multi-client Non-interactive Verifiable Computation SchemeShuaijianni Xu, Liang Feng Zhang. 195-206 [doi]
- MedBIoT: Generation of an IoT Botnet Dataset in a Medium-sized IoT NetworkAlejandro Guerra-Manzanares, Jorge Medina-Galindo, Hayretdin Bahsi, Sven Nõmm. 207-218 [doi]
- Security of Digital Banking Systems in Poland: Users Study 2019Wojciech Wodo, Damian Stygar. 221-231 [doi]
- Comparison of the Paillier and ElGamal Cryptosystems for Smart Grid Aggregation ProtocolsFabian Knirsch, Andreas Unterweger, Maximilian Unterrainer, Dominik Engel. 232-239 [doi]
- Privacy-preserving Surveillance Methods using Homomorphic EncryptionWilliam Bowditch, Will Abramson, William J. Buchanan, Nikolaos Pitropakis, Adam J. Hall. 240-248 [doi]
- Maturity Modelling to Prepare for Cyber Crisis Escalation and ManagementGrethe Østby, Basel Katt. 249-256 [doi]
- Translating Data Protection into Software RequirementsRalf Kneuper. 257-264 [doi]
- Revisiting Higher-order Computational Attacks against White-box ImplementationsHoussem Maghrebi, Davide Alessio. 265-272 [doi]
- Modeling Cyber Threat IntelligenceSiri Bromander, Morton Swimmer, Martin Eian, Geir Skjotskift, Fredrik Borg. 273-280 [doi]
- Integration of Data Envelopment Analysis in Business Process Models: A Novel Approach to Measure Information SecurityAgnes Åkerlund, Christine Große. 281-288 [doi]
- Phishing URL Detection Through Top-level Domain Analysis: A Descriptive ApproachOrestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan. 289-298 [doi]
- An Approach to Secure Legacy Software SystemsStefanie Jasser, Jonas Kelbert. 299-309 [doi]
- Is Ethereum's ProgPoW ASIC Resistant?Jason Orender, Ravi Mukkamala, Mohammad Zubair. 310-316 [doi]
- Exploring Vulnerabilities in Solidity Smart ContractPhitchayaphong Tantikul, Sudsanguan Ngamsuriyaroj. 317-324 [doi]
- Quantifying the Significance of Cybersecurity Text through Semantic Similarity and Named Entity RecognitionOtgonpurev Mendsaikhan, Hirokazu Hasegawa, Yukiko Yamaguchi, Hajime Shimada. 325-332 [doi]
- A Comparison of Blockchain-based PKI ImplementationsClemens Brunner, Fabian Knirsch, Andreas Unterweger, Dominik Engel. 333-340 [doi]
- A Domain-specific Modeling Framework for Attack Surface ModelingTithnara Nicolas Sun, Bastien Drouot, Fahad Rafique Golra, Joël Champeau, Sylvain Guérin, Luka Le Roux, Raúl Mazo, Ciprian Teodorov, Lionel Van Aertryck, Bernard L'Hostis. 341-348 [doi]
- Visualizing Syscalls using Self-organizing Maps for System Intrusion DetectionMax Landauer, Florian Skopik, Markus Wurzenberger, Wolfgang Hotwagner, Andreas Rauber. 349-360 [doi]
- CoProtect: Collaborative Management of Cryptographic Keys for Data Security in Cloud SystemsLorenzo Bracciale, Pierpaolo Loreti, Emanuele Raso, Maurizio Naldi, Giuseppe Bianchi 0001. 361-368 [doi]
- Threat Modeling and Attack Simulations of Smart Cities: A Literature Review and Explorative StudyRobert Lagerström, Wenjun Xiong, Mathias Ekstedt. 369-376 [doi]
- Bident Structure for Neural Network Model ProtectionHsiao-Ying Lin, Chengfang Fang, Jie Shi. 377-384 [doi]
- Risk Identification: From Requirements to Threat ModelsRoman Wirtz, Maritta Heisel. 385-396 [doi]
- A Systematic Approach toward Extracting Technically Enforceable Policies from Data Usage Control RequirementsArghavan Hosseinzadeh, Andreas Eitel, Christian Jung. 397-405 [doi]
- Computer Viruses: The Abstract Theory RevisitedNikolai Gladychev. 406-414 [doi]
- Revisiting Privacy-aware Blockchain Public Key InfrastructurePaul Plessing, Olamide Omolola. 415-423 [doi]
- Securing IoT Devices using Geographic and Continuous Login Blocking: A Honeypot StudyFredrik Heiding, Mohammad-Ali Omer, Andreas Wallström, Robert Lagerström. 424-431 [doi]
- Active Directory Kerberoasting Attack: Monitoring and Detection TechniquesLukás Kotlaba, Simona Buchovecká, Róbert Lórencz. 432-439 [doi]
- CCA Secure Unidirectional PRE with Key Pair in the Standard Model without PairingsAnass Sbai, Cyril Drocourt, Gilles Dequen. 440-447 [doi]
- Using Eyetracker to Find Ways to Mitigate RansomwareBudi Arief, Andy Periam, Orçun Çetin, Julio Hernandez-Castro. 448-456 [doi]
- Email Image Spam Classification based on ResNet Convolutional Neural NetworkVít Listík, Jan Sedivú, Václav Hlavác. 457-464 [doi]
- Evaluation to Classify Ransomware Variants based on Correlations between APIsJiaxing Zhou, Miyuki Hirose, Yoshio Kakizaki, Atsuo Inomata. 465-472 [doi]
- A Practical Approach to Stakeholder-driven Determination of Security Requirements based on the GDPR and Common CriteriaSandra Domenique Zinsmaier, Hanno Langweg, Marcel Waldvogel. 473-480 [doi]
- Achieving Privacy, Security, and Interoperability among Biometric Networks using Symmetric EncryptionEduardo M. Lacerda Filho, Vinícius P. Gonçalves. 481-489 [doi]
- Improving Accuracy and Speed of Network-based Intrusion Detection using Gradient Boosting TreesRyosuke Terado, Morihiro Hayashida. 490-497 [doi]
- Anomaly Detection in Communication Networks of Cyber-physical Systems using Cross-over Data CompressionHubert Schölnast, Paul Tavolato, Philipp Kreimel. 498-505 [doi]
- Privacy-preserving Measures in Smart City Video Surveillance SystemsShizra Sultan, Christian D. Jensen. 506-514 [doi]
- Homomorphic Encryption at Work for Private Analysis of Security LogsAymen Boudguiga, Oana Stan, Hichem Sedjelmaci, Sergiu Carpov. 515-523 [doi]
- Radical Text Detection based on StylometryÁlvaro de Pablo, Oscar Araque, Carlos Angel Iglesias. 524-531 [doi]
- On Analyzing Third-party Tracking via Machine LearningAlfonso Guarino, Delfina Malandrino, Rocco Zaccagnino, Federico Cozza, Antonio Rapuano. 532-539 [doi]
- The Root Causes of Compromised Accounts at the UniversityPhilip Nyblom, Gaute Wangen, Mazaher Kianpour, Grethe Østby. 540-551 [doi]
- Patients to Mobilize Their Data: Secure and Flexible mHealth DelegationRafael Almeida, Pedro Vieira-Marques, Ana Ferreira 0001. 552-560 [doi]
- Accountant: Protection of Data Integrity and Identification of Malicious Nodes in In-network Data ProcessingDavid Jost, Mathias Fischer 0001. 561-568 [doi]
- Building Competitive Advantage from Ubuntu: An African Information Security Awareness ModelTapiwa Gundu, Nthabiseng Modiba. 569-576 [doi]
- A Curious Exploration of Malicious PDF DocumentsJulian Lindenhofer, Rene Offenthaler, Martin Pirker. 577-584 [doi]
- Dual-use Research in Ransomware Attacks: A Discussion on Ransomware Defence IntelligenceZiya Alper Genç, Gabriele Lenzini. 585-592 [doi]
- Systematization of Threats and Requirements for Private Messaging with Untrusted Servers: The Case of e-Mailing and Instant MessagingIraklis Symeonidis, Gabriele Lenzini. 593-602 [doi]
- An Analytical Scanning Technique to Detect and Prevent the Transformed SQL Injection and XSS AttacksMohammad Qbea'h, Saed Alrabaee, Djedjiga Mouheb. 603-610 [doi]
- Neural Network Security: Hiding CNN Parameters with Guided Grad-CAMLinda Guiga, A. W. Roscoe. 611-618 [doi]
- Distributed Defence of Service (DiDoS): A Network-layer Reputation-based DDoS Mitigation ArchitectureAndikan Otung, Andrew Martin. 619-630 [doi]
- Presence Metadata in the Internet of Things: Challenges and OpportunitiesRobert Hegarty, John Haggerty. 631-638 [doi]
- A Study of Classification of Texts into Categories of Cybersecurity Incident and Attack with Topic ModelsMasahiro Ishii 0002, Satoshi Matsuura, Kento Mori, Masahiko Tomoishi, Yong Jin, Yoshiaki Kitaguchi. 639-646 [doi]
- New General Secret Sharing Scheme using Hierarchical Threshold Scheme: Improvement of Information Rates for Specified ParticipantsKouya Tochikubo. 647-654 [doi]
- Greater Control and Transparency in Personal Data ProcessingGiray Havur, Miel Vander Sande, Sabrina Kirrane. 655-662 [doi]
- Securing Industrial Production from Sophisticated CyberattacksAndrew Sundstrom, Damas Limoge, Vadim Pinskiy, Matthew Putman. 663-670 [doi]
- A Meta Model for a Comprehensive Description of Network Protocols Improving Security TestsSteffen Pfrang, David Meier, Andreas Fleig, Jürgen Beyerer. 671-682 [doi]
- Introducing a Verified Authenticated Key Exchange Protocol over Voice Channels for Secure Voice CommunicationPiotr Krasnowski, Jérôme Lebrun, Bruno Martin. 683-690 [doi]
- Legislation and the Negative Impact on Cybersecurity in HealthcareJesse Daniels, Sajal Bhatia. 691-697 [doi]
- Secure Comparison and Interval Test Protocols based on Three-party MPCWataru Fujii, Keiichi Iwamura, Masaki Inamura. 698-704 [doi]
- Multi-level Distributed Intrusion Detection System for an IoT based Smart Home EnvironmentSimone Facchini, Giacomo Giorgi, Andrea Saracino, Gianluca Dini. 705-712 [doi]
- Ontology-based Automation of Penetration TestingGe Chu, Alexei Lisitsa. 713-720 [doi]
- Recommender Systems Robust to Data Poisoning using Trim LearningSeira Hidano, Shinsaku Kiyomoto. 721-724 [doi]
- Distance Metric Learning using Particle Swarm Optimization to Improve Static Malware DetectionMartin Jurecek, Róbert Lórencz. 725-732 [doi]
- Security and Privacy in Smart Grids: Challenges, Current Solutions and Future OpportunitiesIsmail Butun, Alexios Lekidis, Daniel Ricardo Dos Santos. 733-741 [doi]
- Tool Support for Risk-driven Planning of Trustworthy Smart IoT Systems within DevOpsAndreas Thompson, Gencer Erdogan. 742-753 [doi]
- Methodology and Feedback about Systematic Cybersecurity Experts Auditing in BelgiumChristophe Ponsard, Jeremy Grandclaudon, Nicolas Point. 754-759 [doi]
- Towards a Comprehensive Solution for Secure Cryptographic Protocol Execution based on Runtime VerificationChristian Colombo, Mark Vella. 765-774 [doi]
- Detection of Crawler Traps: Formalization and Implementation Defeating Protection on Internet and on the TOR NetworkMaxence Delong, Baptiste David, Eric Filiol. 775-783 [doi]
- Verifying Sanitizer Correctness through Black-Box Learning: A Symbolic Finite Transducer ApproachSophie Lathouwers, Maarten H. Everts, Marieke Huisman. 784-795 [doi]
- The Blockchain Potential in Computer VirologyJoanna Moubarak, Eric Filiol, Maroun Chamoun. 796-803 [doi]
- Android Run-time Permission Exploitation User Awareness by Means of Formal MethodsFausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 804-814 [doi]
- Analysis of Security Attacks in Wireless Sensor Networks: From UPPAAL to CastaliaCinzia Bernardeschi, Gianluca Dini, Maurizio Palmieri, Francesco Racciatti. 815-824 [doi]
- Accidental Sensitive Data Leaks Prevention via Formal VerificationMadalina G. Ciobanu, Fausto Fasano, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 825-834 [doi]
- Bank Credit Risk Management based on Data Mining TechniquesFabio Martinelli, Francesco Mercaldo, Domenico Raucci, Antonella Santone. 837-843 [doi]
- Comparing Machine Learning Techniques for Malware DetectionJoanna Moubarak, Tony Feghali. 844-851 [doi]