ARES B

101 papers

YearTitle / Authors
2017A Blockchain-based Approach for Data Accountability and Provenance Tracking.
Ricardo Neisse, Gary Steri, Igor Nai Fovino
2017A Cloud-Based Compilation and Hardening Platform for Android Apps.
Marcel Busch, Mykolai Protsenko, Tilo Müller
2017A Comparative Study on the Scalability of Dynamic Group Key Agreement Protocols.
Orhan Ermis, Serif Bahtiyar, Emin Anarim, M. Ufuk Çaglayan
2017A Holistic Approach for Privacy Protection in E-Government.
Konstantinos Angelopoulos, Vasiliki Diamantopoulou, Haralambos Mouratidis, Michalis Pavlidis, Mattia Salnitri, Paolo Giorgini, José Fran. Ruiz
2017A Low-Cost UAV-Based Secure Location Verification Method.
Marco Rasori, Pericle Perazzo, Gianluca Dini
2017A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression.
Sabine S. Schmidt, Wojciech Mazurczyk, Jörg Keller, Luca Caviglione
2017A Non-Parametric Model for Accurate and Provably Private Synthetic Data Sets.
Jordi Soria-Comas, Josep Domingo-Ferrer
2017A Trust-based Resilient Routing Mechanism for the Internet of Things.
Zeeshan Ali Khan, Johanna Ullrich, Artemios G. Voyiatzis, Peter Herrmann
2017Adaptive Resource Management Enabling Deception (ARMED).
Partha P. Pal, Nathaniel Soule, Nate Lageman, Shane S. Clark, Marco M. Carvalho, Adrian Granados, Anthony Alves
2017An Approach to Botnet Malware Detection Using Nonparametric Bayesian Methods.
Joseph DiVita, Roger A. Hallman
2017Anomaly Detection for Simulated IEC-60870-5-104 Trafiic.
Ersi Hodo, Stepan Grebeniuk, Henri Ruotsalainen, Paul Tavolato
2017Anomaly-Based Detection and Classification of Attacks in Cyber-Physical Systems.
Philipp Kreimel, Oliver Eigner, Paul Tavolato
2017Application of the holistic Data Privacy and Security Framework PaaSword: A focus on the integration in industrial Pilots.
Sebastian Thomas Schork, Antonia Schwichtenberg, Spiros Alexakis, George Moldovan
2017Application-Specific Digital Forensics Investigative Model in Internet of Things (IoT).
Tanveer A. Zia, Peng Liu, Weili Han
2017Are Network Covert Timing Channels Statistical Anomalies?
Félix Iglesias, Tanja Zseby
2017Artificial Ambient Environments for Proximity Critical Applications.
Iakovos Gurulian, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes
2017Attack Potential in Impact and Complexity.
Luca Allodi, Fabio Massacci
2017Attack Scenario Modeling for Smart Grids Assessment through Simulation.
Andrea Tundis, Rolf Egert, Max Mühlhäuser
2017Authentication Shutter: Alternative Countermeasure against Password Reuse Attack by Availability Control.
Tetsuji Takada
2017Busting a Myth: Review of Agile Security Engineering Methods.
Kalle Rindell, Sami Hyrynsalmi, Ville Leppänen
2017C'mon: Monitoring the Compliance of Cloud Services to Contracted Properties.
Soha Alboghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri
2017Constrained PET Composition for Measuring Enforced Privacy.
Sebastian Funke, Alexander Wiesmaier, Jörg Daubert
2017Continuous Biometric Verification for Non-Repudiation of Remote Services.
Enrico Schiavone, Andrea Ceccarelli, Andrea Bondavalli
2017DevOps for Better Software Security in the Cloud Invited Paper.
Martin Gilje Jaatun, Daniela S. Cruzes, Jesus Luna
2017DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer.
Pal-Stefan Murvay, Bogdan Groza
2017Efficient ID-based Designated Verifier Signature.
Olivier Blazy, Emmanuel Conchon, Paul Germouty, Amandine Jambert
2017Enabling Trust Assessment In Clouds-of-Clouds: A Similarity-Based Approach.
Reda Yaich, Nora Cuppens, Frédéric Cuppens
2017End-node Fingerprinting for Malware Detection on HTTPS Data.
Tomás Komárek, Petr Somol
2017Establishing Mutually Trusted Channels for Remote Sensing Devices with Trusted Execution Environments.
Carlton Shepherd, Raja Naeem Akram, Konstantinos Markantonakis
2017FROST: Anti-Forensics Digital-Dead-DROp Information Hiding RobuST to Detection & Data Loss with Fault tolerance.
Avinash Srinivasan, Hunter Dong, Angelos Stavrou
2017Forensic Image Inspection Assisted by Deep Learning.
Felix Mayer, Martin Steinebach
2017Forensic State Acquisition from Internet of Things (FSAIoT): A general framework and practical approach for IoT forensics through IoT device state acquisition.
Christopher Meffert, Devon Clark, Ibrahim M. Baggili, Frank Breitinger
2017Fully threshold broadcast encryption.
Sigurd Eskeland
2017Go with the -Bitcoin- Flow, with Visual Analytics.
Stefano Bistarelli, Francesco Santini
2017How to Ensure Bad Quality in Metal Additive Manufacturing: In-Situ Infrared Thermography from the Security Perspective.
Andrew Slaughter, Mark Yampolskiy, Manyalibo Matthews, Wayne E. King, Gabe Guss, Yuval Elovici
2017Identification of Dependency-based Attacks on Node.js.
Brian Pfretzschner, Lotfi Ben Othmane
2017Implementing Secure DevOps assessment for highly regulated environments.
Hasan Yasar
2017Incremental Clustering for Semi-Supervised Anomaly Detection applied on Log Data.
Markus Wurzenberger, Florian Skopik, Max Landauer, Philipp Greitbauer, Roman Fiedler, Wolfgang Kastner
2017Insider Misuse Attribution using Biometrics.
Abdulrahman Alruban, Nathan L. Clarke, Fudong Li, Steven Furnell
2017Integrating Reactive Cloud Applications in SERECA.
Christof Fetzer, Giovanni Mazzeo, John Oliver, Luigi Romano, Martijn Verburg
2017Investigating User Comprehension and Risk Perception of Apple's Touch ID Technology.
Yousra Javed, Mohamed Shehab, Emmanuel Bello-Ogunu
2017Investigating the darknet: limitations in Slovenian legal system.
Anze Mihelic, Blaz Markelj, Igor Bernik, Sabina Zgaga
2017JSDES: An Automated De-Obfuscation System for Malicious JavaScript.
Moataz AbdelKhalek, Ahmed F. Shosha
2017Learning Android Malware.
Khanh-Huu-The Dam, Tayssir Touili
2017Lightweight Address Hopping for Defending the IPv6 IoT.
Aljosha Judmayer, Johanna Ullrich, Georg Merzdovnik, Artemios G. Voyiatzis, Edgar R. Weippl
2017M2M-REP: Reputation of Machines in the Internet of Things.
Muhammad Ajmal Azad, Samiran Bag, Feng Hao
2017Machine Learning Approach for Detection of nonTor Traffic.
Elike Hodo, Xavier J. A. Bellekens, Ephraim Iorkyase, Andrew W. Hamilton, Christos Tachtatzis, Robert C. Atkinson
2017Malware and Formal Methods: Rigorous Approaches for detecting Malicious Behaviour.
Fabio Martinelli, Francesco Mercaldo, Vittoria Nardone, Antonella Santone
2017Measuring privacy in high dimensional microdata collections.
Spyros Boukoros, Stefan Katzenbeisser
2017Memory carving can finally unveil your embedded personal data.
Thomas Gougeon, Morgan Barbier, Patrick Lacharme, Gildas Avoine, Christophe Rosenberger
2017Microblogging in a Privacy-Preserving way.
Nikolaos P. Karvelas, Marius Senftleben, Stefan Katzenbeisser
2017NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging.
Harry Halpin
2017On Using TLS to Secure In-Vehicle Networks.
Daniel Zelle, Christoph Krauß, Hubert Strauß, Karsten Schmidt
2017On the Sequential Pattern and Rule Mining in the Analysis of Cyber Security Alerts.
Martin Husák, Jaroslav Kaspar, Elias Bou-Harb, Pavel Celeda
2017On the Usefulness of Compression Models for Authorship Verification.
Oren Halvani, Christian Winter, Lukas Graner
2017One-Message Unilateral Entity Authentication Schemes.
Alfredo De Santis, Manuela Flores, Barbara Masucci
2017Orchestrating Privacy Enhancing Technologies and Services with BPM Tools: The WITDOM Data Protection Orchestrator.
Nicolás Notario, Eleonora Ciceri, Alberto Crespo, Eduardo González Real, Ilio Catallo, Sauro Vicini
2017Overcoming Limits of Blockchain for IoT Applications.
Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera
2017PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices.
Saeed Ibrahim Alqahtani, Shujun Li
2017Popularity-based Detection of Domain Generation Algorithms.
Jasper Abbink, Christian Doerr
2017Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures.
Arne Bilzhause, Henrich C. Pöhls, Kai Samelin
2017Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29 - September 01, 2017
2017Protecting Future Maritime Communication.
Christian Frøystad, Karin Bernsmed, Per Håkon Meland
2017Protection of personal data in security alert sharing platforms.
Václav Stupka, Martin Horák, Martin Husák
2017Provisioning Software with Hardware-Software Binding.
Robert P. Lee, Konstantinos Markantonakis, Raja Naeem Akram
2017Quantifying the Spectrum of Denial-of-Service Attacks through Internet Backscatter.
Norbert Blenn, Vincent Ghiëtte, Christian Doerr
2017Quantitave Dynamic Taint Analysis of Privacy Leakage in Android Arabic Apps.
Ayman Youssef, Ahmed F. Shosha
2017REMI: A Reliable and Secure Multicast Routing Protocol for IoT Networks.
Mauro Conti, Pallavi Kaliyar, Chhagan Lal
2017Reliable Behavioural Factors in the Information Security Context.
Peter Mayer, Alexandra Kunz, Melanie Volkamer
2017Resource Hints in HTML5: A New Pandora's Box of Security Nightmares.
Natalija Vlajic, Xue Ying Shi, Hamzeh Roumani, Pooria Madani
2017Rolling DICE: Lightweight Remote Attestation for COTS IoT Hardware.
Lukas Jäger, Richard Petri, Andreas Fuchs
2017SAFE and Secure: Deeply Integrating Security in a New Hazard Analysis.
Sam Procter, Eugene Y. Vasserman, John Hatcliff
2017SONAR: Automatic Detection of Cyber Security Events over the Twitter Stream.
Quentin Le Sceller, ElMouatez Billah Karbab, Mourad Debbabi, Farkhund Iqbal
2017Searchable Encryption with Access Control.
Nils Löken
2017Secure Enrollment of Certificates Using Short PINs.
Michael Rossberg, Markus Theil
2017Secure Matrix Multiplication with MapReduce.
Xavier Bultel, Radu Ciucanu, Matthieu Giraud, Pascal Lafourcade
2017Secure and Efficient Data Sharing with Atribute-based Proxy Re-encryption Scheme.
Masoomeh Sepehri, Alberto Trombetta
2017Security Analysis of Cordova Applications in Google Play.
Michiel Willocx, Jan Vossaert, Vincent Naessens
2017Security Proofs for Participation Privacy, Receipt-Freeness and Ballot Privacy for the Helios Voting Scheme.
David Bernhard, Oksana Kulyk, Melanie Volkamer
2017Security and Privacy Implications of NFC-enabled Contactless Payment Systems.
Nicholas Akinyokun, Vanessa Teague
2017Self-healing Multi-Cloud Application Modelling.
Erkuden Rios, Eider Iturbe, Maria Carmen Palacios
2017SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
Shankar Karuppayah, Leon Böck, Tim Grube, Selvakumar Manickam, Max Mühlhäuser, Mathias Fischer
2017Source Code Patterns of SQL Injection Vulnerabilities.
Felix Schuckert, Basel Katt, Hanno Langweg
2017Systemic Risk Modeling and Evaluation through Simulation and Bayesian Networks.
Andrea Tundis, Alfredo Garro, Teresa Gallo, Domenico Saccà, Simona Citrigno, Sabrina Graziano, Max Mühlhäuser
2017The Archistar Secret-Sharing Backup Proxy.
Andreas Happe, Florian Wohner, Thomas Lorünser
2017The Demon is in the Configuration: Revisiting Hybrid Mobile Apps Configuration Model.
Abeer Al Jarrah, Mohamed Shehab
2017Timestamp hiccups: Detecting manipulated filesystem timestamps on NTFS.
Sebastian Neuner, Artemios G. Voyiatzis, Martin Schmiedecker, Edgar R. Weippl
2017Towards DDoS Attack Resilient Wide Area Monitoring Systems.
Kubilay Demir, Neeraj Suri
2017Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance.
Dorottya Papp, Levente Buttyán, Zhendong Ma
2017Towards a Model of User-centered Privacy Preservation.
Paul Grace, Mike Surridge
2017Towards a Secure SCRUM Process for Agile Web Application Development.
Patrik Maier, Zhendong Ma, Roderick Bloem
2017Towards the Adoption of Secure Cloud Identity Services.
Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis P. Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner
2017Type Me the Truth!: Detecting Deceitful Users via Keystroke Dynamics.
Merylin Monaro, Riccardo Spolaor, Qianqian Li, Mauro Conti, Luciano Gamberini, Giuseppe Sartori
2017Using Ciphers for Failure-Recovery in ITS Systems.
Mustafa Ayoob, Wael Adi, Vassilis Prevelakis
2017Using Markov Chains to Model Sensor Network Reliability.
Tom Arjannikov, Simon Diemert, Sudhakar Ganti, Chloe Lampman, Edward C. Wiebe
2017VMAttack: Deobfuscating Virtualization-Based Packed Binaries.
Anatoli Kalysch, Johannes Götzfried, Tilo Müller
2017Victim Communication Stack (VCS): A flexible model to select the Human Attack Vector.
Enrico Frumento, Federica Freschi, Davide Andreoletti, Angelo Consoli
2017Which Security Requirements Engineering Methodology Should I Choose?: Towards a Requirements Engineering-based Evaluation Approach.
Sravani Teja Bulusu, Romain Laborde, Ahmad Samer Wazan, François Barrère, Abdelmalek Benzekri
2017ZONESEC: built-in cyber-security for wide area surveillance system.
Aljosa Pasic, Jose-Ramon Martinez-Salio, Susana Gonzalez Zarzosa, Rodrigo Diaz
2017bin2llvm: Analysis of Binary Programs Using LLVM Intermediate Representation.
Kevin Kirchner, Stefan Rosenthaler
2017k-rAC: a Fine-Grained k-Resilient Access Control Scheme for Distributed Hash Tables.
Olga Kieselmann, Arno Wacker, Gregor Schiele