Abstract is missing.
- Usable Security: Security 'Warnings' 2.0Melanie Volkamer. 5
- Cybersecurity, Nicolas Cage and Peppa PigLuca Viganò 0001. 7
- Protecting IoT Ecosystems and AI Leveraging TCG StandardsThorsten Stremlau. 11
- IVNPROTECT: Isolable and Traceable Lightweight CAN-Bus Kernel-Level Protection for Securing in-Vehicle CommunicationShuji Ohira, Araya Kibrom Desta, Ismail Arai, Kazutoshi Fujikawa. 17-28 [doi]
- Towards a Rust SDK for Keystone Enclave Application DevelopmentJukka Julku, Markku Kylänpää. 29-37 [doi]
- Tracing Cryptographic Agility in Android and iOS AppsKris Heid, Jens Heider, Matthias Ritscher, Jan-Peter Stotz. 38-45 [doi]
- Veto: Prohibit Outdated Edge System Software from BootingJonas Röckl, Adam Wagenhäuser, Tilo Müller. 46-57 [doi]
- Clipaha: A Scheme to Perform Password Stretching on the ClientFrancisco Blas Izquierdo Riera, Magnus Almgren, Pablo Picazo-Sanchez, Christian Rohner. 58-69 [doi]
- Automating XSS Vulnerability Testing Using Reinforcement LearningKento Hasegawa, Seira Hidano, Kazuhide Fukushima. 70-80 [doi]
- An Efficient Unified Architecture for Polynomial Multiplications in Lattice-Based CryptoschemesFrancesco Antognazza, Alessandro Barenghi, Gerardo Pelosi, Ruggero Susella. 81-88 [doi]
- Use-Case Denial of Service Attack on Actual Quantum Key Distribution NodesPatrik Burdiak, Emir Dervisevic, Amina Tankovic, Filip Lauterbach, Jan Rozhon, Lukas Kapicak, Libor Michalek, Dzana Pivac, Merima Fehric, Enio Kaljic, Mirza Hamza, Miralem Mehic, Miroslav Voznák. 89-94 [doi]
- A Systematic Review of Secure IoT Data SharingThanh Tran, Phu Nguyen, Gencer Erdogan. 95-105 [doi]
- Dark Ending: What Happens when a Dark Web Market Closes downYichao Wang, Budi Arief, Julio C. Hernandez-Castro. 106-117 [doi]
- Data Leakage in Isolated Virtualized Enterprise Computing SystemsZechariah Wolf, Eric Larson, Mitchell Thornton. 118-123 [doi]
- Exploring False Demand Attacks in Power Grids with High PV PenetrationAshish Neupane, Weiqing Sun. 124-134 [doi]
- SPA Attack on NTRU Protected Implementation with Sparse Representation of Private KeyTomás Rabas, Jirí Bucek, Róbert Lórencz. 135-143 [doi]
- XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical ThingsMohammed M. Alani, Atefeh Mashatan, Ali Miri. 144-151 [doi]
- A Stochastic Game Model for Cloud Platform SecurityLu Li, Guanling Zhao, Kai Shi, Fengjun Zhang. 152-162 [doi]
- Systematic Literature Review of Threat Modeling ConceptsPedro A. Lohmann, Carlos Albuquerque, Raphael Machado. 163-173 [doi]
- On the Use of Multiple Approximations in the Linear Cryptanalysis of Baby RijndaelJosef Kokes, Róbert Lórencz. 174-179 [doi]
- Automating Vehicle SOA Threat Analysis Using a Model-Based MethodologyYuri Gil Dantas, Simon Barner, Pei Ke, Vivek Nigam, Ulrich Schöpp. 180-191 [doi]
- PDIFT: A Practical Dynamic Information-Flow TrackerMichael Kiperberg, Aleksei Rozman, Aleksei Kuraev, Nezer Zaidenberg. 192-198 [doi]
- t.ex-Graph: Automated Web Tracker Detection Using Centrality Metrics and Data Flow CharacteristicsPhilip Raschke, Patrick Herbke, Henry Schwerdtner. 199-209 [doi]
- Secure Joint Querying Over Federated Graph Databases Utilising SMPC ProtocolsNouf Al-Juaid, Alexei Lisitsa 0001, Sven Schewe. 210-217 [doi]
- Automata-Based Study of Dynamic Access Control PoliciesAhmed Khoumsi. 218-227 [doi]
- A Framework for Assessing Decompiler Inference Accuracy of Source-Level Program ConstructsJace Kline, Prasad Kulkarni. 228-239 [doi]
- Fast-Flux Malicious Domain Name Detection Method Based on Domain Resolution Spatial FeaturesShaojie Chen, Bo Lang, Chong Xie. 240-251 [doi]
- Group Privacy for Personalized Federated LearningFilippo Galli, Sayan Biswas, Kangsoo Jung, Tommaso Cucinotta, Catuscia Palamidessi. 252-263 [doi]
- SeCloud: Computer-Aided Support for Selecting Security Measures for Cloud ArchitecturesYuri Gil Dantas, Ulrich Schöpp. 264-275 [doi]
- Efficient Aggregation of Face Embeddings for Decentralized Face Recognition DeploymentsPhilipp Hofer, Michael Roland 0001, Philipp Schwarz, René Mayrhofer. 279-286 [doi]
- Evaluation of DoS/DDoS Attack Detection with ML Techniques on CIC-IDS2017 DatasetSaida Farhat, Manel Abdelkader, Amel Meddeb-Makhlouf, Faouzi Zarai. 287-295 [doi]
- Cybersecurity Awareness and Capacities of SMEsGencer Erdogan, Ragnhild Halvorsrud, Costas Boletsis, Simeon Tverdal, John Brian Pickering. 296-304 [doi]
- An Explainable Convolutional Neural Network for Dynamic Android Malware DetectionFrancesco Mercaldo, Fabio Martinelli, Antonella Santone. 305-312 [doi]
- Machine Learning Based Prediction of Vulnerability Information Subject to a Security AlertRyu Watanabe, Takashi Matsunaka, Ayumu Kubota, Jumpei Urakawa. 313-320 [doi]
- An End-to-End Encrypted Cache System with Time-Dependent Access ControlKeita Emura, Masato Yoshimi. 321-328 [doi]
- Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum MachineShintaro Narisada, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto. 329-338 [doi]
- Towards Audit Requirements for AI-Based Systems in Mobility ApplicationsDevi Padmavathi Alagarswamy, Christian Berghoff, Vasilios Danos, Fabian Langer, Thora Markert, Georg Schneider 0008, Arndt von Twickel, Fabian Woitschek. 339-348 [doi]
- CHARRA-PM: An Attestation Approach Relying on the Passport ModelAntónio Marques, Bruno Sousa. 349-356 [doi]
- Evaluation Scheme to Analyze Keystroke Dynamics MethodsAnastasia Dimaratos, Daniela Pöhn. 357-365 [doi]
- Revisiting the DFT Test in the NIST SP 800-22 Randomness Test SuiteHiroki Okada, Kazuhide Fukushima. 366-372 [doi]
- SHOID: A Secure Herd of IoT Devices Firmware Update ProtocolFrédéric Ruellé, Quentin Guellaën, Arnaud Rosay. 373-380 [doi]
- An Analysis of Cybersecurity Awareness Efforts for Swiss SMEsCiarán Bryce. 381-388 [doi]
- Using Infrastructure-Based Agents to Enhance Forensic Logging of Third-Party ApplicationsJennifer Bellizzi, Mark Vella, Christian Colombo 0001, Julio C. Hernandez-Castro. 389-401 [doi]
- Systematically Searching for Identity-Related Information in the Internet with OSINT ToolsMarcus Walkow, Daniela Pöhn. 402-409 [doi]
- Security Analysis of a Color Image Encryption Scheme Based on Dynamic Substitution and Diffusion OperationsGeorge Teseleanu. 410-417 [doi]
- Measurements of Cross-Border Quantum Key Distribution LinkFilip Lauterbach, Libor Michalek, Piotr Rydlichowski, Patrik Burdiak, Jaroslav Zdralek, Miroslav Voznák. 418-423 [doi]
- Evaluating the Fork-Awareness of Coverage-Guided FuzzersMarcello Maugeri, Cristian Daniele, Giampaolo Bella, Erik Poll. 424-429 [doi]
- SWaTEval: An Evaluation Framework for Stateful Web Application TestingAnne Borcherding, Nikolay Penkov, Mark Giraud, Jürgen Beyerer. 430-441 [doi]
- TTP-Aided Searchable Encryption of Documents Using Threshold Secret SharingAhmad Kamal, Keiichi Iwamura. 442-449 [doi]
- Privacy-Aware IoT: State-of-the-Art and ChallengesShukun Tokas, Gencer Erdogan, Ketil Stølen. 450-461 [doi]
- On the Feasibility of Fully Homomorphic Encryption of Minutiae-Based Fingerprint RepresentationsPia Bauspieß, Lasse Vad, Håvard Myrekrok, Anamaria Costache, Jascha Kolberg, Christian Rathgeb. 462-470 [doi]
- Query Log Analysis for SQL Injection DetectionAlexandra Rocha, Rui Alves, Tiago Pedrosa. 471-476 [doi]
- How to Design a Blue Team Scenario for Beginners on the Example of Brute-Force Attacks on AuthenticationsAndreas Eipper, Daniela Pöhn. 477-484 [doi]
- SCANTRAP: Protecting Content Management Systems from Vulnerability Scanners with Cyber Deception and ObfuscationDaniel Reti, Karina Elzer, Hans Dieter Schotten. 485-492 [doi]
- A k-Anonymization Method for Social Network Data with Link PredictionRisa Sugai, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga. 493-500 [doi]
- Bypassing Multiple Security Layers Using Malicious USB Human Interface DeviceMathew Nicho, Ibrahim Sabry. 501-508 [doi]
- Evaluation of a Tool to Increase Cybersecurity Awareness Among Non-experts (SME Employees)Kaiying Luan, Ragnhild Halvorsrud, Costas Boletsis. 509-518 [doi]
- The Story of Safety Snail and Her e-Mail: A Digital Wellness and Cybersecurity Serious Game for Pre-School ChildrenGünther R. Drevin, Dirk P. Snyman, Lynette Drevin, Hennie A. Kruger, Johann Allers. 519-527 [doi]
- Evading Detection During Network ReconnaissanceIlias Belalis, Georgios P. Spathoulas, Ioannis Anagnostopoulos. 528-534 [doi]
- Temporal Constraints in Online Dating Fraud ClassificationHarrison Bullock, Matthew Edwards. 535-542 [doi]
- Cloud Inspector: A Tool-Based Approach for Public Administrations to Establish Information Security Processes Towards Public CloudsMichael Diener, Thomas Bolz. 543-551 [doi]
- Evaluation of Persistence Methods Used by Malware on Microsoft Windows SystemsAmélie Dieterich, Matthias Schopp, Lars Stiemert, Christoph Steininger, Daniela Pöhn. 552-559 [doi]
- Security Aspects of Digital Twins in IoTVitomir Pavlov, Florian Hahn 0004, Mohammad El-Hajj. 560-567 [doi]
- Identifying Personal Data Processing for Code ReviewFeiyang Tang, Bjarte M. Østvold, Magiel Bruntink. 568-575 [doi]
- Online Transition-Based Feature Generation for Anomaly Detection in Concurrent Data StreamsYinzheng Zhong, Alexei Lisitsa 0001. 576-582 [doi]
- Design Rationale for Symbiotically Secure Key Management Systems in IoT and BeyondWitali Bartsch, Prosanta Gope, Elif Bilge Kavun, Owen Millwood, Andriy Panchenko 0001, Aryan Mohammadi Pasikhani, Ilia Polian. 583-591 [doi]
- Assessing Security and Privacy Insights for Smart Home UsersSamiah Alghamdi, Steven Furnell. 592-599 [doi]
- On the Design of GDPR Compliant Workflows for Responsible Neuroimage Data SharingAlexandros Karakasidis 0001, Vassilios Vassalos. 600-607 [doi]
- Human Factors for Cybersecurity Awareness in a Remote Work EnvironmentCésar Vásquez Flores, José Gonzales, Miranda Kajtazi, Joseph Bugeja, Bahtijar Vogel. 608-616 [doi]
- Towards Long-Term Continuous Tracing of Internet-Wide Scanning Campaigns Based on Darknet AnalysisChansu Han, Akira Tanaka, Jun'ichi Takeuchi, Takeshi Takahashi 0001, Tomohiro Morikawa, Tsung-Nan Lin. 617-625 [doi]
- Vehicle Data Collection: A Privacy Policy Analysis and ComparisonChiara Bodei, Gianpiero Costantino, Marco De Vincenzi, Ilaria Matteucci, Anna Monreale. 626-633 [doi]
- A Scenario-Driven Cyber Security Awareness Exercise Utilizing Dynamic Polling: Methodology and Lessons LearnedMaria Leitner. 634-642 [doi]
- Cyber Teaching Hospitals: Developing Cyber Workforce CompetenceJames R. Elste, David T. Croasdell. 643-650 [doi]
- Correlating Intrusion Detection with Attack Graph on Virtual Computer NetworkingsHanwen Zhang, Wenyong Wang, Lisheng Huang, Junrui Wu, Fengjun Zhang, Kai Shi. 651-658 [doi]
- Vulnerabilities in IoT Devices, Backends, Applications, and ComponentsRauli Kaksonen, Kimmo Halunen, Juha Röning. 659-668 [doi]
- Comparing the Effect of Privacy and Non-Privacy Social Media Photo Tools on Factors of Privacy ConcernVanessa Bracamonte, Sebastian Pape 0001, Sascha Löbner. 669-676 [doi]
- Improving Unlinkability in C-ITS: A Methodology For Optimal ObfuscationYevhen Zolotavkin, Yurii Baryshev, Vitalii Lukichov, Jannik Mähn, Stefan Köpsell. 677-685 [doi]
- P2BAC: Privacy Policy Based Access Control Using P-LPLJens Leicht, Maritta Heisel. 686-697 [doi]
- Secure Software Updates for IoT Based on Industry RequirementsLudwig Seitz, Marco Tiloca, Martin Gunnarsson, Rikard Höglund. 698-705 [doi]
- A Game Theoretic Analysis of Cyber ThreatsPaul Tavolato, Robert Luh, Sebastian Eresheim. 706-713 [doi]
- RPCDroid: Runtime Identification of Permission Usage Contexts in Android ApplicationsMichele Guerra, Roberto Milanese, Rocco Oliveto, Fausto Fasano. 714-721 [doi]
- Towards Security Attack Event Monitoring for Cyber Physical-SystemsElias Seid, Oliver Popov, Fredrik Blix. 722-732 [doi]
- Anomalous File System Activity Detection Through Temporal Association Rule MiningMohammad Reza Heidari Iman, Pavel Chikul, Gert Jervan, Hayretdin Bahsi, Tara Ghasempouri. 733-740 [doi]
- StegWare: A Novel Malware Model Exploiting Payload Steganography and Dynamic CompilationDaniele Albanese, Rosangela Casolare, Giovanni Ciaramella, Giacomo Iadarola, Fabio Martinelli, Francesco Mercaldo, Marco Russodivito, Antonella Santone. 741-748 [doi]
- A Biometric Self Authentication SchemeHervé Chabanne. 749-756 [doi]
- Forecasting Cyber-Attacks to Destination Ports Using Machine LearningKostas Loumponias, Sotiris Raptis, Eleni Darra, Theodora Tsikrika, Stefanos Vrochidis, Ioannis Kompatsiaris. 757-764 [doi]
- A Self-Configuration Controller To Detect, Identify, and Recover Misconfiguration at IoT Edge Devices and Containerized Cluster SystemAreeg Samir, Håvard Dagenborg Johansen. 765-773 [doi]
- Assessing the Impact of Attacks on Connected and Autonomous Vehicles in Vehicular Ad Hoc NetworksKaushik Krishnan Balaji, Dimah Almani, Steven Furnell. 774-782 [doi]
- Differential Privacy: Toward a Better Tuning of the Privacy Budget (ε) Based on RiskMahboobeh Dorafshanian, Mohamed Mejri. 783-792 [doi]
- Assessing Risk in High Performance Computing AttacksErika A. Leal, Cimone Wright-Hamor, Joseph B. Manzano, Nicholas J. Multari, Kevin J. Barker, David O. Manz, Jiang Ming 0002. 793-803 [doi]