Abstract is missing.
- Rethinking Privacy Protection in Federated Learning in the Face of Model Inversion AttacksWenjing Lou. 5
- Securing Ultra-Large Scale Infrastructures: Challenges and OpportunitiesAwais Rashid. 7
- Turing's Echo on Deceptive Machines: The Challenge of Distinguishing Human and AI CreationsAhmad-Reza Sadeghi. 9
- Cybersecurity Challenges in Critical Infrastructure: A Perspective on Regulations and Competence in LuxembourgMaxime Naval, Erik Perjons, Simon Hacks. 15-26 [doi]
- Prioritization of Exploit Codes on GitHub for Better Vulnerability TriageKentaro Kita, Yuta Gempei, Tomoaki Mimoto, Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka. 27-38 [doi]
- Revisiting Permission Piggybacking of Third-Party Libraries in Android AppsKris Heid, Elena Julia Sonntag, Jens Heider. 39-46 [doi]
- Evaluating Explainable AI for Deep Learning-Based Network Intrusion Detection System Alert ClassificationRajesh Kalakoti, Risto Vaarandi, Hayretdin Bahsi, Sven Nõmm. 47-58 [doi]
- Robust Blockchain-Based Federated LearningAftab Akram, Clémentine Gritti, Mohd Hazali Mohamed Halip, Nur Diyana Kamarudin, Marini Mansor, Syarifah Bahiyah Rahayu, Melek Önen. 59-70 [doi]
- ConCERTS: An IoT Cybersecurity Research Range for Education, Experimentation, and Security ResearchDave McKay, Matthew Bush, Marko Kovacevic, Atefeh Mashatan. 71-82 [doi]
- CDAC: Content-Driven Access Control Architecture for Smart FarmsGhadeer I. Yassin, Lakshmish Macheeri Ramaswamy. 83-94 [doi]
- Enabling Trusted Data Sharing in Data Spaces: PROTON - A Privacy-by-Design Approach to Data ProductsLaura Schuiki, Christoph Stach, Corinna Giebler, Eva Hoos, Bernhard Mitschang. 95-106 [doi]
- Characterising and Categorising Anonymization Techniques: A Literature-Based ApproachAndrea Fieschi, Pascal Hirmer, Christoph Stach, Bernhard Mitschang. 107-118
- A Customizable Security Risk Assessment Framework Using Multi-Attribute Decision Making for IoT SystemsMofareh Waqdan, Habib Louafi, Malek Mouhoub. 121-132 [doi]
- A Value-Driven Approach to the Online Consent Conundrum: A Study with the UnemployedPaul van Schaik, Karen Renaud. 133-140 [doi]
- Got Ya!: Sensors for Identity Management Specific Security Situational AwarenessDaniela Pöhn, Heiner Lüken. 141-148 [doi]
- Qualitative In-Depth Analysis of GDPR Data Subject Access Requests and Responses from Major Online ServicesDaniela Pöhn, Nils Gruschka. 149-156 [doi]
- Designing Data Trustees: A Prototype in the Building SectorMichael Steinert, Anna Maria Schleimer, Marcel Altendeitering, David Hick. 157-166 [doi]
- Evaluating Keystroke Dynamics Performance in e-CommerceXiaofei Wang, Andy Meneely, Daqing Hou. 167-175 [doi]
- Analyzing a Concurrent Self-Modifying Program: Application to Malware DetectionWalid Messahel, Tayssir Touili. 176-182 [doi]
- To Be or Not to Be (in the EU): Measurement of Discrepancies Presented in Cookie PaywallsAndreas Stenwreth, Simon Täng, Victor Morel. 183-190 [doi]
- Real-Time Detection of Multi-File DOM-Based XSS Vulnerabilities Using Static Analysis: A Developer-Oriented Approach for Securing Web ApplicationsAkira Kanaoka, Shu Hiura. 191-198 [doi]
- Managing a Ransomware Attack: The Resilience of a Swedish Municipality - A Case StudyAnton Holmström. 199-208 [doi]
- Assessing Sweden's Current Cybersecurity Landscape: Implications of NATO MembershipNike Henriksén, Isak Lexert, Jakob Bergquist Dahn, Simon Hacks. 209-216 [doi]
- PenQuestEnv: A Reinforcement Learning Environment for Cyber SecuritySebastian Eresheim, Simon Gmeiner, Alexander Piglmann, Thomas Petelin, Robert Luh, Paul Tavolato, Sebastian Schrittwieser. 217-224 [doi]
- A Novel Pairing-Free ECC-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption for Secure Cloud StorageShivangi Shukla, Sankita J. Patel. 225-233 [doi]
- Defending Against Phishing Attacks on Cloud-Systems: What Has Been Studied?Carlos Eduardo Araújo Cardoso Cidrão, Oskar Hermansson, Simon Hacks. 234-241 [doi]
- A Reflection on Process-Oriented Industrial IoT Security ManagementMarkus Hornsteiner, Linda Kölbel, Daniel Oberhofer, Stefan Schönig. 242-253 [doi]
- CampusQuest: Motivating Computer Science Students for Cybersecurity from Day OneLuca Pöhler, Marko Schuba, Tim Höner, Sacha Hack, Georg Neugebauer. 254-262 [doi]
- Knowledge Modelling for Automated Risk Assessment of Cybersecurity and Indirect Patient Harms in Medical ContextsSamuel M. Senior, Laura Carmichael, Steve Taylor 0002, Mike Surridge, Xavier Vilalta. 263-274 [doi]
- A Conceptual SOC Framework for Air Traffic Management SystemsWesley Murisa, Marijke Coetzee. 275-282 [doi]
- CASTL: A Composable Source Code Query Language for Security and Vulnerability AnalysisBlake Johnson, Rahul Simha. 283-290 [doi]
- An Alternative Approach to Federated Learning for Model Security and Data PrivacyWilliam Briguglio, Waleed A. Yousef, Issa Traoré, Mohammad Mamun 0001, Sherif Saad. 291-301 [doi]
- USB-IDS-TC: A Flow-Based Intrusion Detection Dataset of DoS Attacks in Different Network ScenariosMarta Catillo, Antonio Pecchia, Umberto Villano. 302-309 [doi]
- Design of an Intelligent Trust Management Architecture for 5G Service DeploymentSamra Bouakkaz, Luis Carlos Suárez, Nora Cuppens, Frédéric Cuppens. 310-317 [doi]
- Iterative Learning-Based Intrusion Detection System for Performance Enhancement in Imbalanced Data EnvironmentsYu-Ran Jeon, Il-Gu Lee. 318-324 [doi]
- Cyber Threat Modeling of an LLM-Based Healthcare SystemNeha Nagaraja, Hayretdin Bahsi. 325-336 [doi]
- Systematisation of Security Risk Knowledge Across Different Domains: A Case Study of Security Implications of Medical DevicesLaura Carmichael, Steve Taylor 0002, Samuel M. Senior, Mike Surridge, Gencer Erdogan, Simeon Tverdal. 337-348 [doi]
- Exploring the Accuracy and Privacy Tradeoff in AI-Driven Healthcare Through Differential PrivacySurabhi Nayak, Sara Nayak. 349-354 [doi]
- Data Collection in Cyber Exercises Through Monitoring Points: Observing, Steering, and ScoringTobias Pfaller, Florian Skopik, Lenhard Reuter, Maria Leitner. 355-366 [doi]
- Compliance Standards and Frameworks and Its Implications on Cybersecurity: A NIS2 Study Within the Swedish Automotive IndustriesAdenike Adesina, Elias Seid, Fredrik Blix, Oliver Popov. 367-376 [doi]
- SABEC: Secure and Adaptive Blockchain-Enabled Coordination Protocol for Unmanned Aerial Vehicles(UAVs) NetworkHulya Dogan, Anton Setzer. 377-388 [doi]
- Topology-Driven Defense: Detecting Model Poisoning in Federated Learning with Persistence DiagramsNarges Alipourjeddi, Ali Miri. 389-396 [doi]
- Secure Opportunistic Routing Protocol in VANETsEqbal Darraji, Iain Phillips 0002, Asma Adnane. 397-404 [doi]
- Current Research, Challenges, and Future Directions in Stalkerware Detection Techniques for Mobile EcosystemsMounika Bonam, Pranathi Rayavaram, Maryam Abbasalizadeh, Claire Seungeun Lee, April Pattavina, Sashank Narain. 405-415 [doi]
- CyberWise: Virtual Security Learning PlatformPayton Howard, Mark Ferraro, Sajal Bhatia. 416-425 [doi]
- GAI-Driven Offensive Cybersecurity: Transforming Pentesting for Proactive DefenceMounia Zaydi, Yassine Maleh. 426-433 [doi]
- FEST: A Unified Framework for Evaluating Synthetic Tabular DataWeijie Niu, Alberto Huertas Celdrán, Karoline Siarsky, Burkhard Stiller. 434-444 [doi]