Abstract is missing.
- Explainability and Privacy-Preserving Data-Driven ModelsVicenç Torra. 5
- Artificial Intelligence for BiometricsVincenzo Piuri. 7
- From Plant to Lab: Industrial Emulation Tools for Real-World Security Testing in Industrial Control SystemsArgiro Anagnostopoulou, Thomas Papaloukas, George Stergiopoulos, Dimitris Gritzalis. 13-25 [doi]
- Attribute Threat Analysis and Risk Assessment for ABAC and TBAC SystemsLeonard Bradatsch, Artur Hermann, Frank Kargl. 26-39 [doi]
- Fuzzy Vault Security Enhancement Avoid Statistical BiasesSara Majbour, Morgan Barbier, Jean-Marie Le Bars. 40-51 [doi]
- UPCARE: User Privacy-Preserving Cancer Research PlatformGeorg Bramm, Melek Önen, Martin Schanzenbach, Ilya Komarov, Frank Morgner, Christian Tiebel, Juan Cadavid. 52-63 [doi]
- Verifying Artifact Authenticity with Unclonable Optical TagsMónica P. Arenas, Gabriele Lenzini, Mohammadamin Rakeei, Peter Y. A. Ryan, Marjan Skrobot, Maria Zhekova. 64-77 [doi]
- A Composition Algebra for Decentralized Enforcement of Access Control Policies with an Application to Vehicular NetworksPeter Amthor 0001, René Gorges. 78-90 [doi]
- DYNAMO: Towards Network Attack Campaign Attribution via Density-Aware Active LearningHelene Orsini, Yufei Han. 91-102 [doi]
- Characterization of Consensus Correctness in Ripple (XRP) NetworksRudrapatna K. Shyamasundar. 103-113 [doi]
- A Secure and Privacy-Preserving Authentication Scheme with a Zero-Trust Approach to Vehicle Renting in VANETsMahdi Akil, Leonardo A. Martucci, Jaap-Henk Hoepman. 114-127 [doi]
- On Privacy of RFID-Based Authentication ProtocolsFerucio Laurentiu Tiplea. 128-139 [doi]
- Backdoor Attacks During Retraining of Machine Learning Models: A Mitigation ApproachMatthew Yudin, Achyut Reddy, Sridhar Venkatesan, Rauf Izmailov. 140-150 [doi]
- Perception of Privacy Tools for Social Media: A Qualitative Analysis Among JapaneseVanessa Bracamonte, Yohko Orito, Yasunori Fukuta, Kiyoshi Murata, Takamasa Isohara. 151-162 [doi]
- Violence Detection: A Serious-Gaming ApproachDerkjan Elzinga, Stan Ruessink, Giuseppe Cascavilla, Damian A. Tamburri, Francesco Leotta, Massimo Mecella, Willem-Jan van den Heuvel. 163-174 [doi]
- DISC: A Dataset for Information Security ClassificationElijah Bass, Massimiliano Albanese, Marcos Zampieri. 175-185 [doi]
- A White-Box Watermarking Modulation for Encrypted DNN in Homomorphic Federated LearningMohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux. 186-197 [doi]
- Formal Analysis of C-ITS PKI ProtocolsMounira Msahli, Pascal Lafourcade 0001, Dhekra Mahmoud. 198-210 [doi]
- Balancing Patient Privacy and Health Data Security: The Role of Compliance in Protected Health Information (PHI) SharingMd. Al-Amin, Hemanth Tummala, Rushabh Shah, Indrajit Ray. 211-223 [doi]
- Enhancing Privacy in Machine Learning: A Robust Approach for Preventing Attribute Inference AttacksMyria Bouhaddi, Kamel Adi. 224-236 [doi]
- Classifying Human-Generated and AI-Generated Election Claims in Social MediaAlphaeus Dmonte, Marcos Zampieri, Kevin Lybarger, Massimiliano Albanese, Genya Coulter. 237-248 [doi]
- Towards a Cryptographic Model for Wireless CommunicationFrederik Armknecht, Christian Müller 0015. 249-261 [doi]
- Cache Side-Channel Attacks Through Electromagnetic Emanations of DRAM AccessesJulien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier. 262-273 [doi]
- MATRaCAE: Time-Based Revocable Access Control in the IoTClémentine Gritti, Emanuel Regnath, Sebastian Steinhorst. 274-285 [doi]
- Large-Scale Analysis of GitHub and CVEs to Determine Prevalence of SQL ConcatenationsKevin Dennis, Bianca Dehaan, Parisa Momeni, Gabriel Laverghetta, Jay Ligatti. 286-297 [doi]
- QuDPas-FHA: Quantum-Defended Privacy-Preserved Fast Handover Authentication in Space Information NetworksArijit Karati, Ting-Yu Chen, Kai-Yao Lin. 298-309 [doi]
- Imperceptible QR Watermarks in High-Resolution VideosTymoteusz Lindner, Tomasz Hawro, Piotr Syga. 310-322 [doi]
- Code Obfuscation Classification Using Singular Value Decomposition on Grayscale Image RepresentationsSebastian Raubitzek, Sebastian Schrittwieser, Caroline Lawitschka, Kevin Mallinger, Andreas Ekelhart, Edgar R. Weippl. 323-333 [doi]
- An ASM-Based Approach for Security Assessment of Ethereum Smart ContractsChiara Braghin, Elvinia Riccobene, Simone Valentini. 334-344 [doi]
- Towards a Secure and Intelligent Access Control Policy Adapter for Big Data EnvironmentEl Mostapha Chakir, Marouane Hachimi, Mohammed Erradi. 345-356 [doi]
- TI-NERmerger: Semi-Automated Framework for Integrating NER Datasets in CybersecurityInoussa Mouiche, Sherif Saad. 357-370 [doi]
- Higher Order Leakage Assessment and Neural Network-based Attack on CRYSTALS-KyberBuvana Ganesh, Mosabbah Mushir Ahmed, Alieeldin Mady. 373-380 [doi]
- K-Resilient Public Key Authenticated Encryption with Keyword SearchKoon-Ming Chan, Swee-Huay Heng, Syh-Yuan Tan, Shing Chiang Tan. 381-388 [doi]
- An Extended Method for Transmitting Secret Messages in Textual Documents Based on Paragraph ResizingBenjamin Aziz, Estabraq Makiyah, Aysha Bukhelli. 389-396 [doi]
- High-Speed Pipelined FPGA Implementation of a Robust Steganographic Scheme for Secure Data Communication SystemsSalah S. Harb, M. Omair Ahmad, M. N. S. Swamy. 397-406 [doi]
- Security Analysis for BB84 Key DistillationSara Nikula, Anssi Lintulampi, Kimmo Halunen. 407-415 [doi]
- MultiVD: A Transformer-based Multitask Approach for Software Vulnerability DetectionClaudio Curto, Daniela Giordano, Simone Palazzo, Daniel Gustav Indelicato. 416-423 [doi]
- SCWAD: Automated Pentesting of Web ApplicationsNatan Talon, Valérie Viet Triem Tong, Gilles Guette, Yufei Han, Youssef Laarouchi. 424-433 [doi]
- Dvorak: A Browser Credential Dumping MalwareJosé Areia, Bruno Santos, Mário Antunes 0002. 434-441 [doi]
- The Use of the DWARF Debugging Format for the Identification of Potentially Unwanted Applications (PUAs) in WebAssembly BinariesCalebe Helpa, Tiago Heinrich, Marcus Botacin, Newton Carlos Will, Rafael R. Obelheiro, Carlos Alberto Maziero. 442-449 [doi]
- Automating Compliance for Improving TLS Security Postures: An Assessment of Public Administration EndpointsRiccardo Germenia, Salvatore Manfredi, Matteo Rizzi, Giada Sciarretta, Alessandro Tomasi 0001, Silvio Ranise. 450-458 [doi]
- Organizing Records for Retrieval in Multi-Dimensional Range Searchable EncryptionMahdieh Heidaripour, Ladan Kian, Maryam Rezapour, Mark Holcomb, Benjamin Fuller 0001, Gagan Agrawal, Hoda Maleki. 459-466 [doi]
- Autoencoder for Detecting Malicious Updates in Differentially Private Federated LearningLucía Alonso, Mina Alishahi. 467-474 [doi]
- The IoT Breaches Your Household AgainDavide Bonaventura, Sergio Esposito, Giampaolo Bella. 475-482 [doi]
- A Formal Analysis of CIE Level 2 Multi-Factor Authentication via SMS OTPRoberto van Eeden, Matteo Paier, Marino Miculan. 483-491 [doi]
- Solving Access Control Conflicts in Multi-User SystemsAlba Martinez Anton, Clara Bertolissi, Jean-Marc Talbot. 492-499 [doi]
- CVE2CWE: Automated Mapping of Software Vulnerabilities to Weaknesses Based on CVE DescriptionsMassimiliano Albanese, Olutola Adebiyi, Frank Onovae. 500-507 [doi]
- Amun: Securing E-Voting Against Over-the-Shoulder CoercionRiccardo Longo, Chiara Spadafora. 508-517 [doi]
- Simulating SASCA on Keccak: Security Implications for Post-Quantum Cryptographic SchemesJulien Maillard, Thomas Hiscock, Maxime Lecomte, Christophe Clavier. 518-527 [doi]
- Kex-Filtering: A Proactive Approach to FilteringFabrizio Baiardi, Filippo Boni, Giovanni Braccini, Emanuele Briganti, Luca Deri. 528-535 [doi]
- Improving the Efficiency of Intrusion Detection Systems by Optimizing Rule Deployment Across Multiple IDSsArka Ghosh, Massimiliano Albanese, Preetam Mukherjee 0003, Amir Alipour Fanid. 536-543 [doi]
- Utilizing Machine Learning for Optimizing Cybersecurity Spending in Critical InfrastructuresGeorge Stergiopoulos, Michalis Detsis, Sozon Leventopoulos, Dimitris Gritzalis. 544-551 [doi]
- Bringing Binary Exploitation at Port 80: Understanding C Vulnerabilities in WebAssemblyEmmanuele Massidda, Lorenzo Pisu, Davide Maiorca, Giorgio Giacinto. 552-559 [doi]
- Safe or Scam? An Empirical Simulation Study on Trust Indicators in Online ShoppingSebastian Schrittwieser, Andreas Ekelhart, Esther Seidl, Edgar R. Weippl. 560-567 [doi]
- Do You Trust Your Device? Open Challenges in IoT Security AnalysisLorenzo Binosi, Pietro Mazzini, Alessandro Sanna, Michele Carminati, Giorgio Giacinto, Riccardo Lazzeretti, Stefano Zanero, Mario Polino, Emilio Coppa, Davide Maiorca. 568-575 [doi]
- Comparison of Access Control Approaches for Graph-Structured DataAya Mohamed 0001, Dagmar Auer, Daniel Hofer, Josef Küng. 576-583 [doi]
- Membership Inference Attacks Against Indoor Location ModelsVahideh Moghtadaiee, Amir Fathalizadeh, Mina Alishahi. 584-591 [doi]
- Enhancing Privacy and Utility in Federated Learning: A Hybrid P2P and Server-Based Approach with Differential Privacy ProtectionLuca Corbucci, Anna Monreale, Roberto Pellungrini. 592-602 [doi]
- Black Sheep Wall: Towards Multiple Vantage Point-Based Information Space Situational AwarenessBernhards Blumbergs. 605-614 [doi]
- Evaluating Digital Forensic Readiness: A Honeypot ApproachPhilip Zimmermann, Sebastian Obermeier 0001. 615-621 [doi]
- HydroLab: A Versatile Hydroelectric Power Lab for Security Research and EducationSebastian Obermeier 0001, Giorgio Tresoldi, Bernhard Tellenbach, Vincent Lenders. 622-627 [doi]
- LAMA: Leakage Abuse Attacks Against Microsoft Always EncryptedRyan Seah, Daren Khu, Alexander Hoover, Ruth Ng. 628-633 [doi]
- chiku: Efficient Probabilistic Polynomial Approximations LibraryDevharsh Trivedi, Nesrine Kaaniche, Aymen Boudguiga, Nikos Triandopoulos. 634-641 [doi]
- On the Implementation of a Lattice-Based DAA for Vanet SystemDoryan Lesaignoux, Mikael Carmona. 642-648 [doi]
- Towards Privacy-Preserving Multi-Cloud Identity Management Using SOLIDAlfredo Cuzzocrea, Islam Belmerabet. 649-654 [doi]
- Linkage Between CVE and ATT&CK with Public InformationTomoaki Mimoto, Yuta Gempei, Kentaro Kita, Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka. 655-660 [doi]
- A Framework for Federated Analysis of Health Data Using Multiparty Homomorphic EncryptionMiroslav Puskaric. 661-667 [doi]
- A Performant Quantum-Resistant KEM for Constrained Hardware: Optimized HQCRidwane Aissaoui, Jean-Christophe Deneuville, Christophe Guerber, Alain Pirovano. 668-673 [doi]
- OIPM: Access Control Method to Prevent ID/Session Token Abuse on OpenID ConnectJunki Yuasa, Taisho Sasada, Christophe Kiennert, Gregory Blanc, Yuzo Taenaka, Youki Kadobayashi. 674-679 [doi]
- Encrypted KNN Implementation on Distributed Edge Device NetworkB. Pradeep Kumar Reddy, Ruchika Meel, Ayantika Chatterjee. 680-685 [doi]
- GAN-based Seed Generation for Efficient FuzzingShyamili Toluchuri, Aishwarya Upadhyay, Smita Naval, Vijay Laxmi, Manoj Singh Gaur. 686-691
- InspectorLog: A New Tool for Offline Attack Detection over Web Log Trace FilesJesús E. Díaz-Verdejo, Javier Muñoz-Calle, Rafael M. Estepa-Alonso, Antonio Estepa Alonso. 692-697 [doi]
- An Efficient Hash Function Construction for Sparse DataNir Soffer, Erez Waisbard. 698-703 [doi]
- Securing Patient Data in IoT Devices: A Blockchain-NFT Approach for Privacy, Security, and AuthenticationFarha Masroor, Adarsh Gopalakrishnan, Neena Goveas. 704-709 [doi]
- Towards an Adaptive Trust Management Model Based on ANFIS in the SIoTHamdi Ouechtati, Nadia Ben Azzouna. 710-715
- Secure Multi-Party Traversal Queries over Federated Graph DatabasesNouf Al-Juaid, Alexei Lisitsa 0001, Sven Schewe. 716-721 [doi]
- Leveraging Deep Learning for Intrusion Detection in IoT Through Visualized Network DataAmine Hattak, Fabio Martinelli, Francesco Mercaldo, Antonella Santone. 722-729 [doi]
- FPGA Implementation of AES-Based on Optimized Dynamic s-BoxCalvo Mayaudón Haroldo, Nakojah Chris David, Mahdi Madani, El-Bay Bourennane. 730-737 [doi]
- Privacy-Preserving Anomaly Detection Through Sampled, Synthetic Data GenerationFatema Rashid, Ali Miri. 738-747 [doi]
- Spellchecker Analysis for Behavioural Biometric of Typing Errors ScenarioBartlomiej Marek, Wojciech Wodo. 748-757 [doi]
- Enhancing Adversarial Defense in Behavioral Authentication Systems Through Random ProjectionsMd. Morshedul Islam, Md. Khairul Anam. 758-763 [doi]
- Lightweight Cryptographic Algorithms: A Position PaperGabriela Mendes Corrêa de Miranda, José Antônio Moreira Xexéo, Renato Hidaka Torres. 764-770 [doi]
- An Uncertain Reasoning-Based Intrusion Detection System for DoS/DDoS DetectionHarpreet Singh, Habib Louafi, Yiyu Yao. 771-776 [doi]
- Manipulating Prompts and Retrieval-Augmented Generation for LLM Service ProvidersAditya Kuppa, Jack Nicholls, Nhien-An Le-Khac. 777-785 [doi]
- Revolutionizing Blockchain Consensus: Towards Deliberative and Unanimous AgreementSyed Badruddoja, Ram Dantu, Mark Dockendorf, Abiola Salau, Kritagya Upadhyay. 786-791 [doi]
- Compact Representation of Digital Camera's Fingerprint with Convolutional AutoencoderJaroslaw Bernacki, Rafal Scherer. 792-797 [doi]
- On the Privacy Afforded by Opaque Identifiers in Traffic MonitoringMarcus Gelderie. 798-803 [doi]
- QPTA: Quantum-Safe Privacy-Preserving Multi-Factor Authentication Scheme for Lightweight DevicesBasker Palaniswamy, Arijit Karati. 804-811 [doi]
- Toward the Foundation of Digital Identity TheoryPierre Fobougong Saha, Mohamed Mejri, Kamel Adi. 812-819 [doi]
- Local Differential Privacy for Data ClusteringLisa Bruder, Mina Alishahi. 820-825 [doi]
- Open-Source Post-Quantum Encryptor: Design, Implementation and DeploymentPetr Tuma 0004, Jan Hajny, Petr Muzikant, Jan Havlin, Lukas Malina, Patrik Dobias, Jan Willemson. 826-831 [doi]
- Graph-Based Modelling of Maximum Period Property for Nonlinear Feedback Shift RegistersEric Filiol, Pierre Filiol. 832-837 [doi]
- BlueDoS: A Novel Approach to Perform and Analyse DoS Attacks on Bluetooth DevicesPoonam Namdeo Shelke, Saurav Gupta, Sukumar Nandi. 838-843 [doi]
- Enhancing OpenID Connect for Verifiable Credentials with DIDCommRoberto De Prisco, Sergiy Shevchenko, Pompeo Faruolo. 844-849 [doi]
- Balancing Act: Navigating the Privacy-Utility Spectrum in Principal Component AnalysisSaloni Kwatra, Anna Monreale, Francesca Naretto. 850-857 [doi]
- Malware Analysis Using Transformer Based Models: An Empirical StudyAbhishek Joshi, Divyateja Pasupuleti, P. Nischith, Sarvesh Sutaone, Soumil Ray, Soumyadeep Dey, Barsha Mitra. 858-865 [doi]
- Virtually Free Randomisations of NTT in RLWE Cryptosystem to Counteract Side Channel Attack Based on Belief PropagationChristophe Nègre, Mbaye Ngom. 866-875
- Property Inference as a Regression Problem: Attacks and DefenseJoshua Stock, Lucas Lange, Erhard Rahm, Hannes Federrath. 876-885 [doi]