| 2018 | (In)Secure Configuration Practices of WPA2 Enterprise Supplicants. Alberto Bartoli, Eric Medvet, Andrea De Lorenzo, Fabiano Tarlao |
| 2018 | A Framework for Monitoring Net Neutrality. Wilfried Mayer, Thomas Schreiber, Edgar R. Weippl |
| 2018 | A GDPR compliance module for supporting the exchange of information between CERTs. Otto Hellwig, Gerald Quirchmayr, Walter Hötzendorfer, Christof Tschohl, Edith Huber, Franz Vock, Florian Nentwich, Bettina Pospisil, Matthias Gusenbauer, Gregor Langner |
| 2018 | A Meta Language for Threat Modeling and Attack Simulations. Pontus Johnson, Robert Lagerström, Mathias Ekstedt |
| 2018 | A New Classification of Attacks against the Cyber-Physical Security of Smart Grids. Ghada Elbez, Hubert B. Keller, Veit Hagenmeyer |
| 2018 | A Nlp-based Solution to Prevent from Privacy Leaks in Social Network Posts. Gerardo Canfora, Andrea Di Sorbo, Enrico Emanuele, Sara Forootani, Corrado Aaron Visaggio |
| 2018 | A Process Framework for Stakeholder-specific Visualization of Security Metrics. Tanja Hanauer, Wolfgang Hommel, Stefan Metzger, Daniela Pöhn |
| 2018 | A Pyramidal-based Model to Compute the Impact of Cyber Security Events. Gustavo Gonzalez Granadillo, Jose Rubio-Hernan, Joaquín García-Alfaro |
| 2018 | A Reactive Defense Against Bandwidth Attacks Using Learning Automata. Nafiseh Kahani, Mehran S. Fallah |
| 2018 | A Simulation Tool for Cascading Effects in Interdependent Critical Infrastructures. Thomas Grafenauer, Sandra König, Stefan Rass, Stefan Schauer |
| 2018 | A novel Self-Organizing Network solution towards Crypto-ransomware Mitigation. Marco Antonio Sotelo Monge, Jorge Maestre Vidal, Luis Javier García-Villalba |
| 2018 | A reference architecture for the container ecosystem. Madiha H. Syed, Eduardo B. Fernández |
| 2018 | A review of network vulnerabilities scanning tools: types, capabilities and functioning. Andrea Tundis, Wojciech Mazurczyk, Max Mühlhäuser |
| 2018 | ATG: An Attack Traffic Generation Tool for Security Testing of In-vehicle CAN Bus. Tianxiang Huang, Jianying Zhou, Andrei Bytes |
| 2018 | Accuracy Enhancement of Electromagnetic Side-Channel Attacks on Computer Monitors. Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon |
| 2018 | Adding Salt to Pepper: A Structured Security Assessment over a Humanoid Robot. Alberto Giaretta, Michele De Donno, Nicola Dragoni |
| 2018 | An Efficient Cryptography-Based Access Control Using Inner-Product Proxy Re-Encryption Scheme. Masoomeh Sepehri, Alberto Trombetta, Maryam Sepehri, Ernesto Damiani |
| 2018 | An investigation of a deep learning based malware detection system. Mohit Sewak, Sanjay K. Sahay, Hemant Rathore |
| 2018 | Android authorship attribution through string analysis. Vaibhavi Kalgutkar, Natalia Stakhanova, Paul Cook, Alina Matyukhina |
| 2018 | Anonymous Charging and Billing of Electric Vehicles. Daniel Zelle, Markus Springer, Maria Zhdanova, Christoph Krauß |
| 2018 | Architectural Solutions to Mitigate Security Vulnerabilities in Software Systems. Priya Anand, Jungwoo Ryoo |
| 2018 | Assessing Internet-wide Cyber Situational Awareness of Critical Sectors. Martin Husák, Nataliia Neshenko, Morteza Safaei Pour, Elias Bou-Harb, Pavel Celeda |
| 2018 | Attack Difficulty Metric for Assessment of Network Security. Preetam Mukherjee, Chandan Mazumdar |
| 2018 | Attack Graph-Based Assessment of Exploitability Risks in Automotive On-Board Networks. Martin Salfer, Claudia Eckert |
| 2018 | Attribute Based Content Security and Caching in Information Centric IoT. Nurefsan Sertbas, Samet Aytaç, Orhan Ermis, Fatih Alagöz, Gürkan Gür |
| 2018 | Augmented DDoS Mitigation with Reputation Scores. Tomás Jánský, Tomás Cejka, Martin Zádník, Václav Bartos |
| 2018 | Behavioural Comparison of Systems for Anomaly Detection. Martin Pirker, Patrick Kochberger, Stefan Schwandter |
| 2018 | Breaking down violence: A deep-learning strategy to model and classify violence in videos. Bruno Malveira Peixoto, Sandra Avila, Zanoni Dias, Anderson Rocha |
| 2018 | CDFEDT: Comparison of Data Flow Error Detection Techniques in Embedded Systems: an Empirical Study. Venu Babu Thati, Jens Vankeirsbilck, Niels Penneman, Davy Pissoort, Jeroen Boydens |
| 2018 | CRUSOE: Data Model for Cyber Situational Awareness. Jana Komárková, Martin Husák, Martin Lastovicka, Daniel Tovarnák |
| 2018 | Challenges and mitigation approaches for getting secured applications in an enterprise company. Pawel Rajba |
| 2018 | Challenges of Cryptocurrencies Forensics: A Case Study of Investigating, Evidencing and Prosecuting Organised Cybercriminals. Syed Naqvi |
| 2018 | Channel Steganalysis. Martin Steinebach, Andre Ester, Huajian Liu |
| 2018 | Cloud Architectures for Searchable Encryption. Johannes Blömer, Nils Löken |
| 2018 | Conceptualizing the digital TAKEDOWN platforms for supporting first-line-practitioners and law enforcement agencies. Florian Huber |
| 2018 | Converting Unstructured System Logs into Structured Event List for Anomaly Detection. Zongze Li, Matthew Davidson, Song Fu, Sean Blanchard, Michael Lang |
| 2018 | Correlation Power Analysis on the PRESENT Block Cipher on an Embedded Device. Owen Lo, William J. Buchanan, Douglas Carson |
| 2018 | Critical Analysis of LPL according to Articles 12 - 14 of the GDPR. Armin Gerl, Dirk Pohl |
| 2018 | CryptSDLC: Embedding Cryptographic Engineering into Secure Software Development Lifecycle. Thomas Lorünser, Henrich C. Pöhls, Leon Sell, Thomas Laenger |
| 2018 | Cybercrime and Organized Crime. Václav Jirovský, Andrej Pastorek, Max Mühlhäuser, Andrea Tundis |
| 2018 | Definitions for Plaintext-Existence Hiding in Cloud Storage. Colin Boyd, Gareth T. Davies, Kristian Gjøsteen, Håvard Raddum, Mohsen Toorani |
| 2018 | Denial-of-Service Attacks on LoRaWAN. Eef van Es, Harald P. E. Vranken, Arjen Hommersom |
| 2018 | Detecting Workload-based and Instantiation-based Economic Denial of Sustainability on 5G environments. Jorge Maestre Vidal, Marco Antonio Sotelo Monge, Luis Javier García-Villalba |
| 2018 | Detection of Obfuscation Techniques in Android Applications. Alessandro Bacci, Alberto Bartoli, Fabio Martinelli, Eric Medvet, Francesco Mercaldo |
| 2018 | Determination of Security Threat Classes on the basis of Vulnerability Analysis for Automated Countermeasure Selection. Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko |
| 2018 | Digital Forensics in the Next Five Years. Laoise Luciano, Ibrahim M. Baggili, Mateusz Topor, Peter Casey, Frank Breitinger |
| 2018 | Digitally Signed and Permission Restricted PDF Files: a Case Study on Digital Forensics. Patrício Domingues, Miguel Frade |
| 2018 | Discovering software vulnerabilities using data-flow analysis and machine learning. Jorrit Kronjee, Arjen Hommersom, Harald P. E. Vranken |
| 2018 | Distributed and Cooperative firewall/controller in cloud environments. Ferdaous Kamoun-Abid, Amel Meddeb-Makhlouf, Faouzi Zarai, Mohsen Guizani |
| 2018 | Enhancing Cybersecurity by Safeguarding Information Privacy: The European Union and the Implementation of the "Data Protection by Design" Approach. Matteo E. Bonfanti |
| 2018 | Enhancing NFV Orchestration with Security Policies. Florian Wendland, Christian Banse |
| 2018 | Enterprise WLAN Security Flaws: Current Attacks and relative Mitigations. Mohamed A. Abo-Soliman, Marianne A. Azer |
| 2018 | Evaluating the degree of security of a system built using security patterns. Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki |
| 2018 | Evaluation of Apache Spot's machine learning capabilities in an SDN/NFV enabled environment. Christos M. Mathas, Olga E. Segou, Georgios Xilouris, Dimitris Christinakis, Michail-Alexandros Kourtis, Costas Vassilakis, Anastasios Kourtis |
| 2018 | Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set. Simon Duque Antón, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten |
| 2018 | Evidence Identification in Heterogeneous Data Using Clustering. Hussam Jasim Mohammed, Nathan L. Clarke, Fudong Li |
| 2018 | Evolution Oriented Monitoring oriented to Security Properties for Cloud Applications. Jamal Toutouh, Antonio Muñoz, Sergio Nesmachnow |
| 2018 | FALKE-MC: A Neural Network Based Approach to Locate Cryptographic Functions in Machine Code. Alexander Aigner |
| 2018 | Finally Johnny Can Encrypt: But Does This Make Him Feel More Secure? Nina Gerber, Verena Zimmermann, Birgit Henhapl, Sinem Emeröz, Melanie Volkamer |
| 2018 | Fingerprint Recognition on Mobile Devices: Widely Deployed, Rarely Understood. Farzaneh Karegar, John Sören Pettersson, Simone Fischer-Hübner |
| 2018 | Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services. Heng Zhang, Jesus Luna, Neeraj Suri, Rubén Trapero |
| 2018 | Forensic APFS File Recovery. Jonas Plum, Andreas Dewald |
| 2018 | Framework for Security Event Management in 5G. I. Adam, J. Ping |
| 2018 | Fully-Featured Anonymous Credentials with Reputation System. Kai Bemmann, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Diemert, Fabian Eidens, Lukas Eilers, Jan Haltermann, Jakob Juhnke, Burhan Otour, Laurens Porzenheim, Simon Pukrop, Erik Schilling, Michael Schlichtig, Marcel Stienemeier |
| 2018 | Get Me Cited, Scotty!: Analysis of Citations in Covert Channel/Steganography Research. Steffen Wendzel |
| 2018 | HYDRA: Hypothesis Driven Repair Automation. Brett Benyo, Shane S. Clark, Aaron Paulos, Partha P. Pal |
| 2018 | Hunting Observable Objects for Indication of Compromise. Arnold Sykosch, Marc Ohm, Michael Meier |
| 2018 | I Know What You Did Last Summer: Your Smart Home Internet of Things and Your iPhone Forensically Ratting You Out. Gokila Dorai, Shiva Houshmand, Ibrahim M. Baggili |
| 2018 | Identity and Access Control for micro-services based 5G NFV platforms. Daniel Guija, Muhammad Shuaib Siddiqui |
| 2018 | Improved RNS-based PRNGs. Alan J. Michaels |
| 2018 | Influence Factors on the Quality of User Experience in OS Reliability: A Qualitative Experimental Study. Daniela Yabe, Caio Augusto Rodrigues dos Santos, Lucas Miranda Assuncao, Rivalino Matias Jr. |
| 2018 | Integrating Threat Intelligence to Enhance an Organization's Information Security Management. Mathias Gschwandtner, Lukas Demetz, Matthias Gander, Ronald Maier |
| 2018 | Investigating the Use of Online Open Source Information as Evidence in European Courts. Yi-Ching Liao |
| 2018 | IoT Forensic: identification and classification of evidence in criminal investigations. François Bouchaud, Gilles Grimaud, Thomas Vantroys |
| 2018 | Keys in the Clouds: Auditable Multi-device Access to Cryptographic Credentials. Arseny Kurnikov, Andrew Paverd, Mohammad Mannan, N. Asokan |
| 2018 | Learning Malware Using Generalized Graph Kernels. Khanh-Huu-The Dam, Tayssir Touili |
| 2018 | Let's shock our IoT's heart: ARMv7-M under (fault) attacks. Sébanjila Kevin Bukasa, Ronan Lashermes, Jean-Louis Lanet, Axel Legay |
| 2018 | Mission-Centric Automated Cyber Red Teaming. Suneel Randhawa, Benjamin P. Turnbull, Joseph Yuen, Jonathan Dean |
| 2018 | Mission-Centric Risk Assessment to Improve Cyber Situational Awareness. F. R. L. Silva, P. Jacob |
| 2018 | Modular Convolutional Neural Network for Discriminating between Computer-Generated Images and Photographic Images. Huy H. Nguyen, Ngoc-Dung T. Tieu, Hoang-Quoc Nguyen-Son, Vincent Nozick, Junichi Yamagishi, Isao Echizen |
| 2018 | Monitoring Product Sales in Darknet Shops. York Yannikos, Annika Schäfer, Martin Steinebach |
| 2018 | New authentication concept using certificates for big data analytic tools. Paul J. E. Velthuis, Marcel Schäfer, Martin Steinebach |
| 2018 | Non-Interactive Key Exchange from Identity-Based Encryption. Olivier Blazy, Céline Chevalier |
| 2018 | On Track of Sigfox Confidentiality with End-to-End Encryption. Radek Fujdiak, Petr Blazek, Konstantin Mikhaylov, Lukas Malina, Petr Mlynek, Jiri Misurec, Vojtech Blazek |
| 2018 | Practical Precise Taint-flow Static Analysis for Android App Sets. William Klieber, Lori Flynn, Will Snavely, Michael Zheng |
| 2018 | Privacy and DRM Requirements for Collaborative Development of AI Applications. Vida Ahmadi Mehri, Dragos Ilie, Kurt Tutschku |
| 2018 | Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, Hamburg, Germany, August 27-30, 2018 Sebastian Doerr, Mathias Fischer, Sebastian Schrittwieser, Dominik Herrmann |
| 2018 | Protecting Patients' Data: An Efficient Method for Health Data Privacy. Mark Daniels, John R. Rose, Csilla Farkas |
| 2018 | Ransomware's Early Mitigation Mechanisms. Routa Moussaileb, Benjamin Bouget, Aurélien Palisse, Hélène Le Bouder, Nora Cuppens, Jean-Louis Lanet |
| 2018 | Recent Granular Computing Implementations and its Feasibility in Cybersecurity Domain. Marek Pawlicki, Michal Choras, Rafal Kozik |
| 2018 | Recovery of Encrypted Mobile Device Backups from Partially Trusted Cloud Servers. Omid Mir, René Mayrhofer, Michael Hölzl, Thanh-Binh Nguyen |
| 2018 | Reputation-Based Security System For Edge Computing. Francis N. Nwebonyi, Rolando Martins, Manuel Eduardo Correia |
| 2018 | Risks of Sharing Cyber Incident Information. Adham Albakri, Eerke A. Boiten, Rogério de Lemos |
| 2018 | Robustness Estimation of Infrastructure Networks: On the Usage of Degree Centrality. Sebastian Wandelt, Xiaoqian Sun |
| 2018 | SDN-based Mitigation of Scanning Attacks for the 5G Internet of Radio Light System. Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski |
| 2018 | Secure Equality Testing Protocols in the Two-Party Setting. Majid Nateghizad, Thijs Veugen, Zekeriya Erkin, Reginald L. Lagendijk |
| 2018 | Secure Fixed-point Division for Homomorphically Encrypted Operands. Chibuike Ugwuoke, Zekeriya Erkin, Reginald L. Lagendijk |
| 2018 | Security Threats and Possible Countermeasures in IoT Applications Covering Different Industry Domains. Musa G. Samaila, João B. F. Sequeiros, Mário M. Freire, Pedro R. M. Inácio |
| 2018 | Security Wrapper Orchestration in Cloud. Aapo Kalliola, Shankar Lal, Kimmo Ahola, Ian Oliver, Yoan Miche, Tuomas Aura |
| 2018 | Software Security Activities that Support Incident Management in Secure DevOps. Martin Gilje Jaatun |
| 2018 | Speeding Up Bug Finding using Focused Fuzzing. Ulf Kargén, Nahid Shahmehri |
| 2018 | Spreading Alerts Quietly: New Insights from Theory and Practice. Olivier Blazy, Céline Chevalier |
| 2018 | Stealthy Attacks on Smart Grid PMU State Estimation. Sarita Paudel, Paul Smith, Tanja Zseby |
| 2018 | Steganography by synthesis: Can commonplace image manipulations like face morphing create plausible steganographic channels? Christian Kraetzer, Jana Dittmann |
| 2018 | Surveying Secure Software Development Practices in Finland. Kalle Rindell, Jukka Ruohonen, Sami Hyrynsalmi |
| 2018 | Tackling Androids Native Library Malware with Robust, Efficient and Accurate Similarity Measures. Anatoli Kalysch, Oskar Milisterfer, Mykolai Protsenko, Tilo Müller |
| 2018 | The AWID prevention approach: The generation of a holistic good practice model for prevention of radicalization in youth work. Diana Silvestru, Karin Rainer, Mario Springnagel |
| 2018 | The Mouseworld, a security traffic analysis lab based on NFV/SDN. Antonio Pastor, Alberto Mozo, Diego R. López, Jesús Folgueira, Angeliki Kapodistria |
| 2018 | The Other Side of the Coin: A Framework for Detecting and Analyzing Web-based Cryptocurrency Mining Campaigns. Julian Rauchberger, Sebastian Schrittwieser, Tobias Dam, Robert Luh, Damjan Buhov, Gerhard Pötzelsberger, Hyoungshick Kim |
| 2018 | The challenge of detecting sophisticated attacks: Insights from SOC Analysts. Olusola Akinrolabu, Ioannis Agrafiotis, Arnau Erola |
| 2018 | The user-centered privacy-aware control system PRICON: An interdisciplinary evaluation. Jonas Walter, Bettina Abendroth, Thilo Von Pape, Christian Plappert, Daniel Zelle, Christoph Krauß, G. Gagzow, Hendrik Decke |
| 2018 | There Goes Your PIN: Exploiting Smartphone Sensor Fusion Under Single and Cross User Setting. David Berend, Shivam Bhasin, Bernhard Jungk |
| 2018 | To Trust or Not to Trust: Data Origin Authentication for Group Communication in 5G Networks. Robert Annessi, Joachim Fabini, Tanja Zseby |
| 2018 | ToGather: Automatic Investigation of Android Malware Cyber-Infrastructures. ElMouatez Billah Karbab, Mourad Debbabi |
| 2018 | Toward a Distributed Trust Management scheme for VANET. Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi |
| 2018 | Towards Deriving Insights into Data Hiding Methods Using Pattern-based Approach. Wojciech Mazurczyk, Steffen Wendzel, Krzysztof Cabaj |
| 2018 | Towards Distributed Network Covert Channels Detection Using Data Mining-based Approach. Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski |
| 2018 | Towards In-Network Security for Smart Homes. Martin Serror, Martin Henze, Sacha Hack, Marko Schuba, Klaus Wehrle |
| 2018 | Towards Utilization of Covert Channels as a Green Networking Technique. Daniel Geisler, Wojciech Mazurczyk, Jörg Keller |
| 2018 | Towards Wireless Secret key Agreement with LoRa Physical Layer. Henri Ruotsalainen, Stepan Grebeniuk |
| 2018 | Towards a 5G Security Architecture: Articulating Software-Defined Security and Security as a Service. Gregory Blanc, Nizar Kheir, Dhouha Ayed, Vincent Lefebvre, Edgardo Montes de Oca, Pascal Bisson |
| 2018 | Towards a Privacy Preserving and Flexible Scheme for Assessing the Credibility and the Accuracy of Safety Messages Exchanged in VANETs. Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi |
| 2018 | Towards an Automated Recognition System for Chat-based Social Engineering Attacks in Enterprise Environments. Nikolaos Tsinganos, Georgios Sakellariou, Panagiotis E. Fouliras, Ioannis Mavridis |
| 2018 | Towards an Automatic Generation of Low-Interaction Web Application Honeypots. Marius Musch, Martin Härterich, Martin Johns |
| 2018 | Universal Trusted Execution Environments for Securing SDN/NFV Operations. Vincent Lefebvre, Gianni Santinelli, Tilo Müller, Johannes Götzfried |
| 2018 | User privacy attitudes regarding proximity sensing. Håkan Jonsson, Carl Magnus Olsson |
| 2018 | Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits. Jacob Taylor, Benjamin P. Turnbull, Gideon Creech |
| 2018 | What are Security Patterns?: A Formal Model for Security and Design of Software. Anika Behrens |
| 2018 | X.509 Certificate Error Testing. David McLuskie, X. Belleken |