Abstract is missing.
- New Directions for High-throughput and High-security CommunicationAdrian Perrig. 5
- Practical and Provably Sound Static Analysis of Ethereum Smart ContractsMatteo Maffei. 7
- Accessible Cyber Security: The Next Frontier?Karen Renaud. 9-18 [doi]
- Who Stores the Private Key? An Exploratory Study about User Preferences of Key Management for Blockchain-based ApplicationsClemens Brunner 0002, Günther Eibl, Peter Fröhlich 0003, Andreas Sackl, Dominik Engel. 23-32 [doi]
- Utilizing Keystroke Dynamics as Additional Security Measure to Protect Account Recovery MechanismAhmed Anu Wahab, Daqing Hou, Stephanie Schuckers, Abbie Barbir. 33-42 [doi]
- On Security Analysis of Periodic Systems: Expressiveness and ComplexityMusab A. AlTurki, Tajana Ban Kirigin, Max I. Kanovich, Vivek Nigam, Andre Scedrov, Carolyn L. Talcott. 43-54 [doi]
- Predicting Security Program Effectiveness in Bring-Your-Own-Device Deployment in OrganizationsAlexander O. Akande, Vu N. Tran. 55-65 [doi]
- Automatic Detection of Cyber Security Events from Turkish Twitter Stream and Newspaper DataÖzgür Ural, Cengiz Acartürk. 66-76 [doi]
- Improvement of Secure Multi-Party Multiplication of (k, n) Threshold Secret Sharing Using Only N = k ServersAhmad Akmal Aminuddin Mohd Kamal, Keiichi Iwamura. 77-88 [doi]
- An Analytic Attack against ARX Addition Exploiting Standard Side-channel LeakageYan Yan 0018, Elisabeth Oswald, Srinivas Vivek 0001. 89-97 [doi]
- Bridging Knowledge Gaps in Security AnalyticsFabian Böhm, Manfred Vielberth, Günther Pernul. 98-108 [doi]
- The Comparison of Word Embedding Techniques in RNNs for Vulnerability DetectionHai Ngoc Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara. 109-120 [doi]
- A Permissioned Blockchain-based System for Collaborative Drug DiscoveryChristoffer Olsson, Mohsen Toorani. 121-132 [doi]
- Checking Contact Tracing App ImplementationsRobert Flood, Sheung Shi Chan, Wei Chen, David Aspinall 0001. 133-144 [doi]
- Optimizing Leak Detection in Open-source Platforms with Machine Learning TechniquesSofiane Lounici, Marco Rosa, Carlo Maria Negri, Slim Trabelsi, Melek Önen. 145-159 [doi]
- Adversarial Machine Learning: A Comparative Study on Contemporary Intrusion Detection DatasetsYulexis Pacheco, Weiqing Sun. 160-171 [doi]
- Automatic Detection and Decryption of AES by Monitoring S-Box AccessJosef Kokes, Jonatan Matejka, Róbert Lórencz. 172-180 [doi]
- Parallel Privacy-preserving Computation of Minimum Spanning TreesMohammad Anagreh, Eero Vainikko, Peeter Laud. 181-190 [doi]
- Hydra: Practical Metadata Security for Contact Discovery, Messaging, and DialingDavid Schatz, Michael Rossberg, Guenter Schaefer. 191-203 [doi]
- Automated Black Box Detection of HTTP GET Request-based Access Control Vulnerabilities in Web ApplicationsMalte Kushnir, Olivier Favre, Marc Rennhard, Damiano Esposito, Valentin Zahnd. 204-216 [doi]
- A State Saturation Attack against Massively Multiplayer Online VideogamesBlake D. Bryant, Hossein Saiedian. 217-225 [doi]
- CyExec*: Automatic Generation of Randomized Cyber Range ScenariosRyotaro Nakata, Akira Otsuka. 226-236 [doi]
- From Exposed to Exploited: Drawing the Picture of Industrial Control Systems Security Status in the Internet AgeYixiong Wu, Jianwei Zhuge, Tingting Yin, Tianyi Li, JunMin Zhu, Guannan Guo, Yue Liu, Jianju Hu. 237-248 [doi]
- Towards Academic and Skills Credentialing Standards and Distributed Ledger TechnologiesMorné Pretorius, Nelisiwe Dlamini, Sthembile Mthethwa. 249-257 [doi]
- A Protection against the Extraction of Neural Network ModelsHervé Chabanne, Vincent Despiegel, Linda Guiga. 258-269 [doi]
- Admonita: A Recommendation-based Trust Model for Dynamic Data IntegrityWassnaa Al-Mawee, Steve Carr, Jean Mayo. 273-282 [doi]
- Experiences and Recommendations from Operating a Tor Exit Node at a UniversityMichael Sonntag, René Mayrhofer. 283-290 [doi]
- Mobile Robots: An Overview of Data and SecurityEsmeralda Kadena, Huu Phuoc Dai Nguyen, Lourdes Ruiz. 291-299
- Automatically Extracting Business Level Access Control Requirements from BPMN Models to Align RBAC PoliciesRoman Pilipchuk, Robert Heinrich, Ralf H. Reussner. 300-307 [doi]
- Protecting Privacy during a Pandemic OutbreakKarsten Martiny, Linda Briesemeister, Grit Denker, Mark St. John, Ron Moore. 308-318 [doi]
- Enhanced Information Management in Inter-organisational Planning for Critical Infrastructure Protection: Case and FrameworkChristine Große. 319-330 [doi]
- Model-based Threat and Risk Assessment for Systems DesignAvi Shaked, Yoram Reich. 331-338 [doi]
- Towards Collaborative Cyber Threat Intelligence for Security ManagementOleksii Osliak, Andrea Saracino, Fabio Martinelli, Theo Dimitrakos. 339-346 [doi]
- A Secure Network Scanner Architecture for Asset Management in Strongly Segmented ICS NetworksMatthias Niedermaier, Thomas Hanka, Florian Fischer, Dominik Merli. 347-355 [doi]
- Canopy: A Learning-based Approach for Automatic Low-and-Slow DDoS MitigationLucas Cadalzo, Christopher H. Todd, Banjo Obayomi, W. Brad Moore, Anthony C. Wong. 356-367 [doi]
- Remote WebAuthn: FIDO2 Authentication for Less Accessible DevicesPaul Wagner, Kris Heid, Jens Heider. 368-375 [doi]
- Active Directory Kerberoasting Attack: Detection using Machine Learning TechniquesLukás Kotlaba, Simona Buchovecká, Róbert Lórencz. 376-383 [doi]
- Field Studies on the Impact of Cryptographic Signatures and Encryption on Phishing EmailsStefanie Pham, Matthias Schopp, Lars Stiemert, Sebastian Seeber, Daniela Pöhn, Wolfgang Hommel. 384-390 [doi]
- Towards a Formalisation of Expert's Knowledge for an Automatic Construction of a Vulnerability Model of a Cyberphysical SystemWitold Klaudel, Artur Rataj. 391-398 [doi]
- A Novel Simplified Framework to Secure IoT CommunicationsSairath Bhattacharjya, Hossein Saiedian. 399-406 [doi]
- Linking Biometric Voice Identity with Self-monitoring Health Data as a Temporal-spatial Event Stored in a Mobile DeviceBon Sy. 407-415 [doi]
- DLP-Visor: A Hypervisor-based Data Leakage Prevention SystemGuy Amit, Amir Yeshooroon, Michael Kiperberg, Nezer J. Zaidenberg. 416-423 [doi]
- Continuous Authentication based on Hand Micro-movement during Smartphone Form Filling by Seated Human SubjectsAratrika Ray, Daqing Hou, Stephanie Schuckers, Abbie Barbir. 424-431 [doi]
- Blockchain based Secured Virtual Machine Image MonitorSrijita Basu, Sandip Karmakar, Debasish Bera. 432-439 [doi]
- The Proposal of Double Agent Architecture using Actor-critic Algorithm for Penetration TestingHoang Viet Nguyen, Songpon Teerakanok, Atsuo Inomata, Tetsutaro Uehara. 440-449 [doi]
- Two Stage Anomaly Detection for Network Intrusion DetectionHelmut Neuschmied, Martin Winter, Katharina Hofer-Schmitz, Branka Stojanovic, Ulrike Kleb. 450-457 [doi]
- Ontology-based Cybersecurity and Resilience FrameworkHelmar Hutschenreuter, Salva Daneshgadeh Çakmakçi, Christian Maeder, Thomas Kemmerich. 458-466 [doi]
- Study of Intra- and Inter-user Variance in Password Keystroke DynamicsBlaine Ayotte, Mahesh K. Banavar, Daqing Hou, Stephanie Schuckers. 467-474 [doi]
- Windows Malware Binaries in C/C++ GitHub Repositories: Prevalence and Lessons LearnedWilliam La Cholter, Matthew Elder, Antonius Stalick. 475-484 [doi]
- Implementation of Secondary Available Digital Content Protection Schemes using Identity-based SignaturesNozomi Nagashima, Masaki Inamura, Keiichi Iwamura. 485-491 [doi]
- Towards an Ontology for Enterprise Level Information Security Policy AnalysisDebashis Mandal, Chandan Mazumdar. 492-499 [doi]
- Enabling Monetization of Depreciating Data on BlockchainsChristian Dahdah, Coline Van Leeuwen, Ziad Kheil, Jérôme Lacan, Jonathan Detchart, Thibault Gateau. 500-507 [doi]
- Profiling and Discriminating of Containerized ML Applications in Digital Data Marketplaces (DDM)Lu Zhang 0046, Reginald Cushing, Ralph Koning, Cees de Laat, Paola Grosso. 508-515 [doi]
- Representation of PE Files using LSTM NetworksMartin Jurecek, Matous Kozák. 516-525 [doi]
- Understanding How People Weigh the Costs and Benefits of using FacebookJack McClary, Sid Stamm. 526-533 [doi]
- How to Improve the GDPR Compliance through Consent Management and Access ControlSaid Daoudagh, Eda Marchetti, Vincenzo Savarino, Roberto Di Bernardo, Marco Alessi. 534-541 [doi]
- Sociocultural Influences for Password Definition: An AI-based StudyCarlos Ocanto Dávila, Rocío Cabrera Lozoya, Slim Trabelsi. 542-549 [doi]
- Efficient Semantic Representation of Network Access Control Configuration for Ontology-based Security AnalysisFlorian Patzer, Jürgen Beyerer. 550-557 [doi]
- A Lemon by Any Other LabelVaibhav Garg. 558-565 [doi]
- Implementing Secure Applications Thanks to an Integrated Secure ElementSylvain Guilley, Michel Le Rolland, Damien Quenson. 566-571 [doi]
- An Asynchronous Federated Learning Approach for a Security Source Code ScannerSabrina Kall, Slim Trabelsi. 572-579 [doi]
- HyperPass: Secure Password Input PlatformMichael Kiperberg, Nezer J. Zaidenberg. 580-587 [doi]
- Detecting Cyber Security Attacks against a Microservices Application using Distributed TracingStephen Jacob, Yuansong Qiao, Brian A. Lee. 588-595 [doi]
- Stopping DNS Rebinding Attacks in the BrowserMohammadreza Hazhirpasand, Arash Ale Ebrahim, Oscar Nierstrasz. 596-603 [doi]
- Securing the Linux Boot Process: From Start to FinishJakob Hagl, Oliver Mann, Martin Pirker. 604-610 [doi]
- Leveraging Dynamic Information for Identity and Access Management: An Extension of Current Enterprise IAM ArchitectureAlexander Puchta, Sebastian Groll, Günther Pernul. 611-618 [doi]
- Dreaming of Keys: Introducing the Phantom Gradient AttackÅvald Åslaugson Sommervoll. 619-627 [doi]
- Towards Exploring User Perception of a Privacy Sensitive Information Detection ToolVanessa Bracamonte, Welderufael B. Tesfay, Shinsaku Kiyomoto. 628-634 [doi]
- Evaluation of Vulnerability Reproducibility in Container-based Cyber RangeRyotaro Nakata, Akira Otsuka. 635-642 [doi]
- Improving Classification of Malware Families using Learning a Distance MetricMartin Jurecek, Olha Jurecková, Róbert Lórencz. 643-652 [doi]
- A Dynamic Access Control System based on Situations of UsersHirokazu Hasegawa, Hiroki Takakura. 653-660 [doi]
- An Overview of Cryptographic AccumulatorsIlker Özçelik, Sai Medury, Justin T. Broaddus, Anthony Skjellum. 661-669 [doi]
- MADLIRA: A Tool for Android Malware DetectionKhanh-Huu-The Dam, Tayssir Touili. 670-675 [doi]
- Securing Orchestrated Containers with BSI Module SYS.1.6Christoph Haar, Erik Buchmann. 676-683 [doi]
- Privacy Preserving Services for Intelligent Transportation Systems with Homomorphic EncryptionAymen Boudguiga, Oana Stan, Abdessamad Fazzat, Houda Labiod, Pierre-Emmanuel Clet. 684-693 [doi]
- Security Property ModelingHiba Hnaini, Luka Le Roux, Joël Champeau, Ciprian Teodorov. 694-701 [doi]
- Developing Cyber-risk Centric Courses and Training Material for Cyber Ranges: A Systematic ApproachGencer Erdogan, Antonio Álvarez Romero, Niccolò Zazzeri, Anze Zitnik, Mariano Basile, Giorgio Aprile, Mafalda Osório, Claudia Pani, Ioannis Kechaoglou. 702-713 [doi]
- Release-aware In-out Encryption Adjustment in MongoDB Query ProcessingMaryam Almarwani, Boris Konev, Alexei Lisitsa. 714-722 [doi]
- Learning from Smartphone Location Data as Anomaly Detection for Behavioral Authentication through Deep NeuroevolutionMhd Irvan, Tran Phuong Thao, Ryosuke Kobayashi, Toshiyuki Nakata 0001, Rie Shigetomi Yamaguchi. 723-728 [doi]
- Malware Classification with Word Embedding FeaturesAparna Sunil Kale, Fabio Di Troia, Mark Stamp. 733-742 [doi]
- Malware Classification using Long Short-term Memory ModelsDennis Dang, Fabio Di Troia, Mark Stamp. 743-752 [doi]
- Malware Classification with GMM-HMM ModelsJing Zhao, Samanvitha Basole, Mark Stamp. 753-762 [doi]
- Unconventional Attack against Voting Machines Enlarging the Scope of Cybersecurity Risk AnalysisEric Filiol. 763-770 [doi]
- A New Dataset for Smartphone Gesture-based AuthenticationElliu Huang, Fabio Di Troia, Mark Stamp, Preethi Sundaravaradhan. 771-780 [doi]
- On Formalising and Analysing the Tweetchain ProtocolMariapia Raimondo, Simona Bernardi 0001, Stefano Marrone 0001. 781-791 [doi]
- Experimental Evaluation of Description Logic Concept Learning Algorithms for Static Malware DetectionPeter Svec, Stefan Balogh, Martin Homola. 792-799 [doi]
- Towards Formal Security Verification of Over-the-Air Update Protocol: Requirements, Survey and UpKit Case StudyChristophe Ponsard, Denis Darquennes. 800-808 [doi]
- Colluding Covert Channel for Malicious Information Exfiltration in Android EnvironmentRosangela Casolare, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 811-818 [doi]