Abstract is missing.
- Web Content Integrity: Tamper-Proof Websites Beyond HTTPSSven Zemanek, Sebastian Tauchert, Max Jens Ufer, Lilli Bruckschen. 1-14 [doi]
- Privacy-Preserving Clustering for Multi-dimensional Data Randomization Under LDPHiroaki Kikuchi. 15-29 [doi]
- Hierarchical Model-Based Cybersecurity Risk Assessment During System DesignTino Jungebloud, Nhung H. Nguyen, Dong Seong Kim 0001, Armin Zimmermann. 30-44 [doi]
- The Influence of Privacy Concerns on Cryptocurrency AcceptancePeter Hamm, Sebastian Pape 0001, Kai Rannenberg. 45-58 [doi]
- Automated Enrichment of Logical Attack Graphs via Formal OntologiesKéren Saint-Hilaire, Frédéric Cuppens, Nora Cuppens, Joaquín García-Alfaro. 59-72 [doi]
- Detecting Web Bots via Mouse Dynamics and Communication MetadataAugust See, Tatjana Wingarz, Matz Radloff, Mathias Fischer 0001. 73-86 [doi]
- Practical Single-Round Secure Wildcard Pattern MatchingJun Xu, Shengnan Zhao, Chuan Zhao, Zhenxiang Chen, Zhe Liu, Liming Fang 0001. 87-101 [doi]
- Efficient Non-interactive Anonymous CommunicationSigurd Eskeland, Svetlana Boudko. 102-116 [doi]
- PointPuff: An Ed25519 Optimization ImplementationMengqing Yang, Chunxiao Ye, Yuanmu Liu, Yan Jin, Chunming Ye. 117-130 [doi]
- Detecting Web Tracking at the Network LayerMaximilian Wittig, Dogan Kesdogan. 131-148 [doi]
- What's Inside a Node? Malicious IPFS Nodes Under the Magnifying GlassChristos Karapapas, George C. Polyzos, Constantinos Patsakis. 149-162 [doi]
- Quantum-Secure Communication for Trusted Edge Computing with IoT DevicesGeorge Kornaros, Georgia Berki, Miltos D. Grammatikakis. 163-176 [doi]
- Evaluation of a Red Team Automation Tool in Live Cyber Defence ExercisesHannes Holm, Jenni Reuben. 177-190 [doi]
- Automated and Improved Detection of Cyber Attacks via an Industrial IDS ProbeAlmamy Touré, Youcef Imine, Thierry Delot, Antoine Gallais, Alexis Semnont, Robin Giraudo. 191-206 [doi]
- An Accurate and Real-Time Detection Method for Concealed Slow HTTP DoS in Backbone NetworkJinfeng Chen, Hua Wu, Suyue Wang, Guang Cheng 0001, Xiaoyan Hu. 207-221 [doi]
- Towards an Information Privacy Competency Model for the Usage of Mobile ApplicationsAikaterini Soumelidou, Aggeliki Tsohou. 222-235 [doi]
- SecPassInput: Towards Secure Memory and Password Handling in Web ApplicationsPascal Wichmann, August See, Hannes Federrath. 236-249 [doi]
- Bl0ck: Paralyzing 802.11 Connections Through Block Ack FramesEfstratios Chatzoglou, Vyron Kampourakis, Georgios Kambourakis. 250-264 [doi]
- Enhancing the ACME Protocol to Automate the Management of All X.509 Web CertificatesDavid A. Cordova Morales, Ahmad Samer Wazan, David W. Chadwick, Romain Laborde, April Rains Reyes Maramara, Kalil Cabral. 265-278 [doi]
- MADONNA: Browser-Based MAlicious Domain Detection Through Optimized Neural Network with Feature AnalysisJanaka Senanayake, Sampath Rajapaksha, Naoto Yanai, Chika Komiya, Harsha Kalutarage. 279-292 [doi]
- Cyber Key Terrain Identification Using Adjusted PageRank CentralityLukás Sadlek, Pavel Celeda. 293-306 [doi]
- Machine Learning Metrics for Network Datasets EvaluationDominik Soukup, Daniel Uhrícek, Daniel Vasata, Tomás Cejka. 307-320 [doi]
- Factors of Intention to Use a Photo Tool: Comparison Between Privacy-Enhancing and Non-privacy-enhancing ToolsVanessa Bracamonte, Sebastian Pape 0001, Sascha Löbner. 321-334 [doi]
- Real-Time Platform Identification of VPN Video Streaming Based on Side-Channel AttackAnting Lu, Hua Wu 0004, Hao Luo, Guang Cheng 0001, Xiaoyan Hu. 335-349 [doi]
- Toward the Establishment of Evaluating URL Embedding Methods Using Intrinsic Evaluator via Malicious URLs DetectionQisheng Chen, Kazumasa Omote. 350-360 [doi]
- Key Management Based on Ownership of Multiple Authenticators in Public Key AuthenticationKodai Hatakeyama, Daisuke Kotani, Yasuo Okabe. 361-375 [doi]