Abstract is missing.
- A Twofold Group Key Agreement Protocol for NoC based MPSoCsGaurav Sharma 0006, Veronika Kuchta, Rajeev Anand Sahu, Soultana Ellinidou, Olivier Markowitch, Jean-Michel Dricot. 1-2 [doi]
- Weak and Strong Deniable Authenticated Encryption: On their Relationship and ApplicationsKasper Bonne Rasmussen, Paolo Gasti. 1-10 [doi]
- Comprehensible Categorization and Visualization of Orchestrated Malicious Domain Names using Linkage AnalysisShin-Ying Huang, Tzu-Hsien Chuang, Shi-Meng Huang, Tao Ban. 1-2 [doi]
- Parallel Linear Regression on Encrypted DataToufique Morshed, Dima Alhadidi, Noman Mohammed. 1-5 [doi]
- Mining Sequential Patterns from Outsourced Data via Encryption SwitchingGamze Tillem, Zekeriya Erkin, Reginald L. Lagendijk. 1-10 [doi]
- The continued risks of unsecured public Wi-Fi and why users keep using it: Evidence from JapanNissy Sombatruang, Youki Kadobayashi, M. Angela Sasse, Michelle Baddeley, Daisuke Miyamoto. 1-11 [doi]
- Industry-Wide Analysis of Open Source SecurityYiming Zhang, Baljeet Malhotra, Cheng Chen. 1-10 [doi]
- Exploring the Impact of Password Dataset Distribution on GuessingHazel Murray, David Malone. 1-8 [doi]
- Digitized Trust in Human-in-the-Loop Health ResearchAndrew Sutton, Reza Samavi, Thomas E. Doyle, David Koff. 1-10 [doi]
- GIDS: GAN based Intrusion Detection System for In-Vehicle NetworkEunbi Seo, Hyun Min Song, Huy Kang Kim. 1-6 [doi]
- Secure Compression and Pattern Matching Based on Burrows-Wheeler TransformGongxian Zeng, Meiqi He, Linru Zhang, Jun Zhang, Yuechen Chen, Siu-Ming Yiu. 1-10 [doi]
- Problem-based Derivation of Trustworthiness Requirements from Users' Trust ConcernsNazila Gol Mohammadi, Nelufar Ulfat-Bunyadi, Maritta Heisel. 1-10 [doi]
- Privacy-Preserving Subgraph CheckingStefan Wüller, Benjamin Assadsolimani, Ulrike Meyer, Susanne Wetzel. 1-6 [doi]
- On Sybil Classification in Online Social Networks Using Only Structural FeaturesDieudonne Mulamba, Indrajit Ray, Indrakshi Ray. 1-10 [doi]
- Analysis and Evaluation of Syntactic Privacy Notions and GamesRobin Ankele, Andrew Simpson. 1-2 [doi]
- Approximating Robust Linear Regression With An Integral Privacy GuaranteeNavoda Senavirathne, Vicenç Torra. 1-10 [doi]
- Mitigating CSRF attacks on OAuth 2.0 SystemsWanpeng Li, Chris J. Mitchell, Thomas Chen. 1-5 [doi]
- xLED: Covert Data Exfiltration from Air-Gapped Networks via Switch and Router LEDsMordechai Guri, Boris Zadov, Andrey Daidakulov, Yuval Elovici. 1-12 [doi]
- EagleEye: A Novel Visual Anomaly Detection MethodIman Sharafaldin, Ali A. Ghorbani. 1-6 [doi]
- Enabling Users to Balance Social Benefit and Privacy in Online Social NetworksSourya Joyee De, Abdessamad Imine. 1-10 [doi]
- Hide-and-Seek with Website Identity InformationMilica Stojmenovic, Robert Biddle. 1-6 [doi]
- Mutual Authentication in Electronic Voting SchemesVoke Augoye, Allan Tomlinson. 1-2 [doi]
- Exploring User Behavior and Cybersecurity Knowledge - An experimental study in Online ShoppingGhada El Haddad, Amin Shahab, Esma Aïmeur. 1-10 [doi]
- A Power Analysis of Cryptocurrency Mining: A Mobile Device PerspectiveJames Clay, Alexander Hargrave, Ramalingam Sridhar. 1-5 [doi]
- Crossing Cross-Domain Paths in the Current WebJukka Ruohonen, Joonas Salovaara, Ville Leppänen. 1-5 [doi]
- A Family of Droids-Android Malware Detection via Behavioral Modeling: Static vs Dynamic AnalysisLucky Onwuzurike, Mário Almeida, Enrico Mariconti, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro. 1-10 [doi]
- An Implementation and Evaluation of Progressive Authentication Using Multiple Level Pattern LocksWilliam Aiken, Hyoungshick Kim, Jungwoo Ryoo, Mary Beth Rosson. 1-6 [doi]
- Towards Improving Privacy Control for Smart Homes: A Privacy Decision FrameworkMahsa Keshavarz, Mohd Anwar. 1-3 [doi]
- Timing is Almost Everything: Realistic Evaluation of the Very Short Intermittent DDoS AttacksJeman Park 0001, DaeHun Nyang, Aziz Mohaisen. 1-10 [doi]
- Usability and Security Effects of Code Examples on Crypto APIsKai Mindermann, Stefan Wagner 0001. 1-2 [doi]
- At Your Own Risk: Shaping Privacy Heuristics for Online Self-disclosureNicolas E. Diaz Ferreyra, Rene Meis, Maritta Heisel. 1-10 [doi]
- Enforcing Privacy and Security in Public Cloud StorageJoão S. Resende, Rolando Martins, Luis Antunes 0002. 1-5 [doi]
- Location Privacy and Utility in Geo-social Networks: Survey and Research ChallengesZohaib Riaz, Frank Dürr, Kurt Rothermel. 1-10 [doi]
- Privacy-Preserving Architectures with Probabilistic GuarantiesKai Bavendiek, Robin Adams, Sibylle Schupp. 1-10 [doi]
- Automated Proofs of Signatures using Bilinear PairingsGuruprasad Eswaraiah, Roopa Vishwanathan, Douglas Nedza. 1-10 [doi]
- Using AP-TED to Detect Phishing Attack VariationsSophie Le Page, Gregor von Bochmann, Qian Cui, Jason Flood, Guy-Vincent Jourdan, Iosif-Viorel Onut. 1-6 [doi]
- Privacy Preserving Probabilistic Record Linkage Without Trusted Third PartyIbrahim Lazrig, Toan C. Ong, Indrajit Ray, Indrakshi Ray, Xiaoqian Jiang, Jaideep Vaidya. 1-10 [doi]
- How-to Express Explicit and Auditable ConsentAna C. Carvalho, Rolando Martins, Luis Antunes 0002. 1-5 [doi]
- Managing Publicly Known Security Vulnerabilities in Software SystemsHesham Mahrous, Baljeet Malhotra. 1-10 [doi]
- CHARIOT: Cloud-Assisted Access Control for the Internet of ThingsClémentine Gritti, Melek Önen, Refik Molva. 1-6 [doi]
- Andro-Simnet: Android Malware Family Classification using Social Network AnalysisHye Min Kim, Hyun Min Song, Jae Woo Seo, Huy Kang Kim. 1-8 [doi]
- Poster: Agent-based (BDI) modeling for automation of penetration testingGe Chu, Alexei Lisitsa. 1-2 [doi]
- Detecting Cryptomining Using Dynamic AnalysisDomhnall Carlin, Philip O'Kane, Sakir Sezer, Jonah Burgess. 1-6 [doi]
- Coalition-Resistant Peer Rating for Long-Term ConfidentialityGiulia Traverso, Denis Butin, Johannes Buchmann 0001, Alex Palesandro. 1-10 [doi]
- Extended Abstract: Ethical and Privacy Considerations in CybersecurityBrittany Davis, Christopher Whitfield, Mohd Anwar. 1-2 [doi]
- Evaluation and Development of Onomatopoeia CAPTCHAsMichihiro Yamada, Riko Shigeno, Hiroaki Kikuchi, Maki Sakamoto. 1-2 [doi]
- Mitigating Client Subnet Leakage in DNS QueriesLanlan Pan, Xin Zhang, Anlei Hu, Xuebiao Yuchi, Jian Wang. 1-2 [doi]
- Peer Based Tracking using Multi-Tuple Indexing for Network Traffic Analysis and Malware DetectionMatthew Hagan, Boojoong Kang, Kieran McLaughlin, Sakir Sezer. 1-5 [doi]
- Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart GridRafiullah Khan, Kieran McLaughlin, John Hastings, David M. Laverty, Sakir Sezer. 1-10 [doi]
- Extended Abstract: A Review of Biometric Traits with Insight into Vein Pattern RecognitionSoheil Varastehpour, Hamid R. Sharifzadeh, Iman Tabatabaei Ardekani, Abdolhossein Sarrafzadeh. 1-2 [doi]
- The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence DataTomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji. 1-7 [doi]
- Unmasking Android Obfuscation Tools Using Spatial AnalysisRatinder Kaur, Ye Ning, Hugo Gonzalez, Natalia Stakhanova. 1-10 [doi]
- Trust-driven, Decentralized Data Access Control for Open Network of Autonomous Data ProvidersLukasz Opiola, Lukasz Dutka, Renata G. Slota, Jacek Kitowski. 1-10 [doi]