Abstract is missing.
- RPM: Additive Stream Ciphers for Lightweight Communication SecurityGiovanni Di Crescenzo, Glenn Veach. [doi]
- Social networks bot detection using Benford's lawMaksim Kalameyets, Dmitry Levshun, Sergei Soloviev, Andrey Chechulin, Igor V. Kotenko. [doi]
- Threat Modeling based Penetration Testing: The Open Energy Monitor Case studyGiovanni Salzillo, Massimiliano Rak, Felice Moretta. [doi]
- SMART Citizen Cyber Resilience (SC2R) OntologyMamello Thinyane, Debora Irene Christine. [doi]
- Towards a user-centric IAM entitlement shop - Learnings from the e-commerceMarkus Hornsteiner, Sebastian Groll, Alexander Puchta. [doi]
- Secure and Privacy-Aware Gateway for Home Automation SystemsSinem Gur, Simge Demir, Sevval Simsek, Albert Levi. [doi]
- Detecting Malicious Signal Manipulation in Smart Grids Using Intelligent Analysis of Contextual DataFarzan Majdani, Lynne Batik, Andrei Petrovski 0001, Sergey Petrovski. [doi]
- A Survey on Malware Detection with Deep LearningMuhammet Sahin, Serif Bahtiyar. [doi]
- When GDPR Meets CRAs (Credit Reference Agencies): Looking through the Lens of TwitterKubra Aydin, Rahime Belen Saglam, Shujun Li, Abdullah Bulbul. [doi]
- Power Analysis Side-Channel Attacks on Symmetric Block Cipher MagmaStanislav Zhdanov, Ekaterina Maro. [doi]
- Unconventional Mechanisms for Biometric Data Acquisition via Side-ChannelsJonathan Francis Roscoe, Max Smith-Creasey. [doi]
- AI-based Security for the Smart NetworksMaxim O. Kalinin, Peter D. Zegzhda. [doi]
- Exploiting Race Condition for Wi-Fi Denial of Service AttacksKarim Lounis, Mohammad Zulkernine. [doi]
- Hacking Passwords that Satisfy Common Password Policies: Hacking PasswordsRichard Beno, Ron Poet. [doi]
- Neural network approach to assessing cybersecurity risks in large-scale dynamic networksVasiliy Krundyshev. [doi]
- Eye Gaze-Based Human Error Prevention System: Experts vs. Non-ExpertsOksana Kilik, Abdulaziz Almehmadi, Khalil El-Khatib. [doi]
- Malicious URL Detection Using Supervised Machine Learning TechniquesVara Vundavalli, Farhat Barsha, Mohammad Masum, Hossain Shahriar, Hisham Haddad. [doi]
- Creating Graphical Passwords on a Mobile Phone: Graphical Passwords on a MobileJessica Fong, Ron Poet. [doi]
- CyberSecurity Attack Prediction: A Deep Learning ApproachOuissem Ben Fredj, Alaeddine Mihoub, Moez Krichen, Omar Cheikhrouhou, Abdelouahid Derhab. [doi]
- A Subjective Network Approach for Cybersecurity Risk AssessmentNasser Al-Hadhrami, Matthew Collinson, Nir Oren. [doi]
- Tension between GDPR and Public Blockchains: A Data-Driven Analysis of Online DiscussionsZeynep Chousein, Haci Yakup Tetik, Rahime Belen Saglam, Abdullah Bülbül, Shujun Li. [doi]
- Development of the mathematic model of disymmetric bigram cryptosystem based on a parametric solution family of multi-degree system of Diophantine equations✱Valeriy O. Osipyan, Kirill I. Litvinov. [doi]
- Permission Management and User Privacy Based On Android: Permission Management On AndroidJiyou Wang, Ron Poet. [doi]
- Detection of False Command and Response Injection Attacks for Cyber Physical Systems Security and ResilienceHope Nkiruka Eke, Andrei Petrovski 0001, Hatem Ahriz. [doi]
- An Approach to Discover and Assess Vulnerability Severity Automatically in Cyber-Physical SystemsYuning Jiang, Yacine Atif. [doi]
- Detection of attacks on the Internet of Things based on intelligent analysis of devices functioning indicatorsTigran Ovasapyan, Dmitry A. Moskvin, Artem Tsvetkov. [doi]
- PoliceChain: Blockchain-Based Smart Policing System for Smart CitiesArnab Mukherjee, Raju Halder. [doi]
- Credit Card Fraud Detection with NCA Dimensionality ReductionBeyazit Bestami Yuksel, Serif Bahtiyar, Ayse Yilmazer. [doi]
- Characteristics of a two-stage synchronization algorithm in the system of quantum key distribution with dividing a fiber-optic line into sections with decreasing lengthYakov Mironov, Polina Mironova, Konstantin Rumyantsev. [doi]
- Intelligent support for network administrator decisions based on combined neural networksIgor V. Kotenko, Igor Saenko, Fadey Skorik. [doi]
- Modeling replay and integrity violations attacks for cryptographic protocols source codes verification of e-voting system based on blind intermediariesLiudmila Babenko, Ilya Pisarev. [doi]
- SpotCheck: On-Device Anomaly Detection for AndroidMark Vella, Christian Colombo. [doi]
- Towards systematic honeytoken fingerprintingShreyas Srinivasa, Jens Myrup Pedersen, Emmanouil Vasilomanolakis. [doi]
- Visual spoofing in content-based spam detectionMark Sokolov, Kehinde Olufowobi, Nic Herndon. [doi]