| 2019 | 6G Network Needs to Support Embedded Trust. Raimo Kantola |
| 2019 | A First ISA-Level Characterization of EM Pulse Effects on Superscalar Microarchitectures: A Secure Software Perspective. Julien Proy, Karine Heydemann, Alexandre Berzati, Fabien Majéric, Albert Cohen |
| 2019 | A Location Privacy Analysis of Bluetooth Mesh. Matthias Caesar, Jan Steffan |
| 2019 | A Misuse Pattern for Compromising VMs via Virtual Machine Escape in NFV. Abdulrahman Khalid Alnaim, Ahmed M. Alwakeel, Eduardo B. Fernández |
| 2019 | A Pattern for a Virtual Network Function (VNF). Ahmed M. Alwakeel, Abdulrahman Khalid Alnaim, Eduardo B. Fernández |
| 2019 | A Quantitative Evaluation of Trust in the Quality of Cyber Threat Intelligence Sources. Thomas Schaberreiter, Veronika Kupfersberger, Konstantinos Rantos, Arnolnt Spyros, Alexandros Papanikolaou, Christos Ilioudis, Gerald Quirchmayr |
| 2019 | A Secure Publish/Subscribe Protocol for Internet of Things. Lukas Malina, Gautam Srivastava, Petr Dzurenda, Jan Hajny, Radek Fujdiak |
| 2019 | A Study of Network Forensic Investigation in Docker Environments. Daniel Spiekermann, Tobias Eggendorfer, Jörg Keller |
| 2019 | A Systematic Analysis of User Evaluations in Security Research. Peter Hamm, David Harborth, Sebastian Pape |
| 2019 | AIDA Framework: Real-Time Correlation and Prediction of Intrusion Detection Alerts. Martin Husák, Jaroslav Kaspar |
| 2019 | AMON: an Automaton MONitor for Industrial Cyber-Physical Security. Giuseppe Bernieri, Mauro Conti, Gabriele Pozzan |
| 2019 | Adversarial Communication Networks Modeling for Intrusion Detection Strengthened against Mimicry. Jorge Maestre Vidal, Marco Antonio Sotelo Monge |
| 2019 | Alexa's Voice Recording Behavior: A Survey of User Understanding and Awareness. Yousra Javed, Shashank Sethi, Akshay Jadoun |
| 2019 | An Analysis Framework for Product Prices and Supplies in Darknet Marketplaces. York Yannikos, Julian Heeger, Maria Brockmeyer |
| 2019 | An Attribute-Based Privacy-Preserving Ethereum Solution for Service Delivery with Accountability Requirements. Francesco Buccafurri, Vincenzo De Angelis, Gianluca Lax, Lorenzo Musarella, Antonia Russo |
| 2019 | Analyzing Android's File-Based Encryption: Information Leakage through Unencrypted Metadata. Tobias Groß, Matanat Ahmadova, Tilo Müller |
| 2019 | Anonymous Identity Based Encryption with Traceable Identities. Olivier Blazy, Laura Brouilhet, Duong Hieu Phan |
| 2019 | Applicability of the IEC 62443 standard in Industry 4.0 / IIoT. Björn Leander, Aida Causevic, Hans Hansson |
| 2019 | Applying Security Testing Techniques to Automotive Engineering. Irdin Pekaric, Clemens Sauerwein, Michael Felderer |
| 2019 | Assessing the Applicability of Authorship Verification Methods. Oren Halvani, Christian Winter, Lukas Graner |
| 2019 | Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems. Peter Amthor, Daniel Fischer, Winfried E. Kühnhauser, Dirk Stelzer |
| 2019 | Automated Pattern Inference Based on Repeatedly Observed Malware Artifacts. Christian Doll, Arnold Sykosch, Marc Ohm, Michael Meier |
| 2019 | Behavior-Aware Network Segmentation using IP Flows. Juraj Smeriga, Tomás Jirsík |
| 2019 | Black Box Attacks on Deep Anomaly Detectors. Aditya Kuppa, Slawomir Grzonkowski, Muhammad Rizwan Asghar, Nhien-An Le-Khac |
| 2019 | Blockchain Trilemma Solver Algorand has Dilemma over Undecidable Messages. Mauro Conti, Ankit Gangwal, Michele Todero |
| 2019 | Building Taxonomies based on Human-Machine Teaming: Cyber Security as an Example. Mohamad Imad Mahaini, Shujun Li, Rahime Belen Saglam |
| 2019 | Characterizing the Redundancy of DarkWeb .onion Services. Pavlo Burda, Coen Boot, Luca Allodi |
| 2019 | Costing Secure Software Development: A Systematic Mapping Study. Elaine Venson, Xiaomeng Guo, Zidi Yan, Barry W. Boehm |
| 2019 | Cyber Security Skill Set Analysis for Common Curricula Development. Muhammad Mudassar Yamin, Basel Katt |
| 2019 | Cyber Threat Information Sharing: Perceived Benefits and Barriers. Adam Zibak, Andrew Simpson |
| 2019 | DEMISe: Interpretable Deep Extraction and Mutual Information Selection Techniques for IoT Intrusion Detection. Luke R. Parker, Paul D. Yoo, A. Taufiq Asyhari, Lounis Chermak, Yoonchan Jhi, Kamal Taha |
| 2019 | DTE Access Control Model for Integrated ICS Systems. Khaoula Es-Salhi, David Espes, Nora Cuppens |
| 2019 | Data-driven Curation, Learning and Analysis for Inferring Evolving IoT Botnets in the Wild. Morteza Safaei Pour, Antonio Mangino, Kurt Friday, Matthias Rathbun, Elias Bou-Harb, Farkhund Iqbal, Khaled B. Shaban, Abdelkarim Erradi |
| 2019 | Decision Support for Mission-Centric Cyber Defence. Michal Javorník, Jana Komárková, Martin Husák |
| 2019 | Deep Learning-based Facial Detection and Recognition in Still Images for Digital Forensics. Patrício Domingues, Alexandre Frazão Rosário |
| 2019 | Detecting DGA domains with recurrent neural networks and side information. Ryan R. Curtin, Andrew B. Gardner, Slawomir Grzonkowski, Alexey Kleymenov, Alejandro Mosquera |
| 2019 | Detection and Analysis of Tor Onion Services. Martin Steinebach, Marcel Schäfer, Alexander Karakuz, Katharina Brandl, York Yannikos |
| 2019 | Does "www." Mean Better Transport Layer Security? Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin |
| 2019 | E2E Verifiable Borda Count Voting System without Tallying Authorities. Samiran Bag, Muhammad Ajmal Azad, Feng Hao |
| 2019 | Efficient Attack Countermeasure Selection Accounting for Recovery and Action Costs. Jukka Soikkeli, Luis Muñoz-González, Emil Lupu |
| 2019 | Energy Attack in LoRaWAN: Experimental Validation. Konstantin Mikhaylov, Radek Fujdiak, Ari Pouttu, Miroslav Voznák, Lukas Malina, Petr Mlynek |
| 2019 | Enhancing credibility of digital evidence through provenance-based incident response handling. Ludwig Englbrecht, Gregor Langner, Günther Pernul, Gerald Quirchmayr |
| 2019 | Examining and Constructing Attacker Categorisations: an Experimental Typology for Digital Banking. Caroline Moeckel |
| 2019 | Fake News Detection by Image Montage Recognition. Martin Steinebach, Karol Gotkowski, Huajian Liu |
| 2019 | Federated Identity Management and Interoperability for Heterogeneous Cloud Platform Ecosystems. Nirojan Selvanathan, Dileepa Jayakody, Violeta Damjanovic-Behrendt |
| 2019 | Fine-tuning of Distributed Network Covert Channels Parameters and Their Impact on Undetectability. Krzysztof Cabaj, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski |
| 2019 | Framework for Anticipatory Self-Protective 5G Environments. Jorge Maestre Vidal, Marco Antonio Sotelo Monge |
| 2019 | GDPR Compliance in Cybersecurity Software: A Case Study of DPIA in Information Sharing Platform. Martin Horák, Václav Stupka, Martin Husák |
| 2019 | HEHLKAPPE: Utilizing Deep Learning to Manipulate Surveillance Camera Footage in Real-Time. Alexander Aigner, Rene Zeller |
| 2019 | IO-Trust: An out-of-band trusted memory acquisition for intrusion detection and Forensics investigations in cloud IOMMU based systems. Ahmad Atamli, Giuseppe Petracca, Jon Crowcroft |
| 2019 | Improved Manipulation Detection with Convolutional Neural Network for JPEG Images. Huajian Liu, Martin Steinebach, Kathrin Schölei |
| 2019 | Improving Borderline Adulthood Facial Age Estimation through Ensemble Learning. Felix Anda, David Lillis, Aikaterini Kanta, Brett A. Becker, Elias Bou-Harb, Nhien-An Le-Khac, Mark Scanlon |
| 2019 | Introducing Dead Drops to Network Steganography using ARP-Caches and SNMP-Walks. Tobias Schmidbauer, Steffen Wendzel, Aleksandra Mileva, Wojciech Mazurczyk |
| 2019 | IoT Ignorance is Digital Forensics Research Bliss: A Survey to Understand IoT Forensics Definitions, Challenges and Future Research Directions. Tina Wu, Frank Breitinger, Ibrahim M. Baggili |
| 2019 | IoT-HarPSecA: A Framework for Facilitating the Design and Development of Secure IoT Devices. Musa G. Samaila, Moser Z. V. José, João B. F. Sequeiros, Mário M. Freire, Pedro R. M. Inácio |
| 2019 | Language-based Integration of Digital Forensics & Incident Response. Christopher Stelly, Vassil Roussev |
| 2019 | Large-Scale Analysis of Pop-Up Scam on Typosquatting URLs. Tobias Dam, Lukas Daniel Klausner, Damjan Buhov, Sebastian Schrittwieser |
| 2019 | Learning Software Security in Context: An Evaluation in Open Source Software Development Environment. Shao-Fang Wen, Basel Katt |
| 2019 | Leveraging Kernel Security Mechanisms to Improve Container Security: a Survey. Maxime Bélair, Sylvie Laniepce, Jean-Marc Menaud |
| 2019 | Limits in the data for detecting criminals on social media. Andrea Tundis, Leon Böck, Victoria Stanilescu, Max Mühlhäuser |
| 2019 | Location Tracking Using Smartphone Accelerometer and Magnetometer Traces. Khuong An Nguyen, Raja Naeem Akram, Konstantinos Markantonakis, Zhiyuan Luo, Chris Watkins |
| 2019 | Managing Security in Software: Or: How I Learned to Stop Worrying and Manage the Security Technical Debt. Kalle Rindell, Karin Bernsmed, Martin Gilje Jaatun |
| 2019 | Managing the Overestimation of Resilience. Thomas Clédel, Nora Cuppens, Frédéric Cuppens |
| 2019 | Map My Murder: A Digital Forensic Study of Mobile Health and Fitness Applications. Courtney Hassenfeldt, Shabana Baig, Ibrahim M. Baggili, Xiaolu Zhang |
| 2019 | Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts. Xiaoyu Du, Mark Scanlon |
| 2019 | Model Driven Security in a Mobile Banking Application Context. Serafettin Sentürk, Hasan Yasar, Ibrahim Sogukpinar |
| 2019 | NERD: Network Entity Reputation Database. Václav Bartos |
| 2019 | Near-optimal Evasion of Randomized Convex-inducing Classifiers in Adversarial Environments. Pooria Madani, Natalija Vlajic |
| 2019 | Obfuscation-Resilient Code Recognition in Android Apps. Johannes Feichtner, Christof Rabensteiner |
| 2019 | On the Exploitation of Online SMS Receiving Services to Forge ID Verification. Mohammad Hajian Berenjestanaki, Mauro Conti, Ankit Gangwal |
| 2019 | On the Utility of Synthetic Data: An Empirical Evaluation on Machine Learning Tasks. Markus Hittmeir, Andreas Ekelhart, Rudolf Mayer |
| 2019 | Ontology of Metrics for Cyber Security Assessment. Elena Doynikova, Andrey Fedorchenko, Igor V. Kotenko |
| 2019 | Performance Evaluation of Elliptic Curve Libraries on Automotive-Grade Microcontrollers. Lucian Popa, Bogdan Groza, Pal-Stefan Murvay |
| 2019 | Plug-and-Patch: Secure Value Added Services for Electric Vehicle Charging. Lucas Buschlinger, Markus Springer, Maria Zhdanova |
| 2019 | PoliDOM: Mitigation of DOM-XSS by Detection and Prevention of Unauthorized DOM Tampering. Junaid Iqbal, Ratinder Kaur, Natalia Stakhanova |
| 2019 | Post-Quantum Cryptography in Embedded Systems. Soundes Marzougui, Juliane Krämer |
| 2019 | Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions. Olivier Blazy, Céline Chevalier, Quoc-Huy Vu |
| 2019 | Practical Group-Signatures with Privacy-Friendly Openings. Stephan Krenn, Kai Samelin, Christoph Striecks |
| 2019 | Preserving context security in AWS IoT Core. Luca Calderoni |
| 2019 | Privacy and Robust Hashes. Martin Steinebach, Sebastian Lutz, Huajian Liu |
| 2019 | Privacy-Enhancing Context Authentication from Location-Sensitive Data. Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas |
| 2019 | Privacy-Enhancing Fall Detection from Remote Sensor Data Using Multi-Party Computation. Pradip Mainali, Carlton Shepherd |
| 2019 | Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research. Donatello Luna, Luca Allodi, Marco Cremonini |
| 2019 | Protocol-independent Detection of "Messaging Ordering" Network Covert Channels. Steffen Wendzel |
| 2019 | Realistically Fingerprinting Social Media Webpages in HTTPS Traffic. Mariano Di Martino, Peter Quax, Wim Lamotte |
| 2019 | Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing. Ralph Ankele, Stefan Marksteiner, Kai Nahrgang, Heribert Vallant |
| 2019 | Revisiting Data Hiding Techniques for Apple File System. Thomas Göbel, Jan Türr, Harald Baier |
| 2019 | SET-OT: A Secure Equality Testing Protocol Based on Oblivious Transfer. Ferhat Karakoç, Majid Nateghizad, Zekeriya Erkin |
| 2019 | STAMAD: a STAtic MAlware Detector. Khanh-Huu-The Dam, Tayssir Touili |
| 2019 | Securing Ethernet-based Optical Fronthaul for 5G Network. Joo Yeon Cho, Andrew Sergeev, Jim Zou |
| 2019 | Securing V2X Communications for the Future: Can PKI Systems offer the answer? Thanassis Giannetsos, Ioannis Krontiris |
| 2019 | Securing the Device Drivers of Your Embedded Systems: Framework and Prototype. Zhuohua Li, Jincheng Wang, Mingshen Sun, John C. S. Lui |
| 2019 | Semantic Mediation for A Posteriori Log Analysis. Farah Dernaika, Nora Cuppens-Boulahia, Frédéric Cuppens, Olivier Raynaud |
| 2019 | Sniffing Detection within the Network: Revisiting Existing and Proposing Novel Approaches. Krzysztof Cabaj, Marcin Gregorczyk, Wojciech Mazurczyk, Piotr Nowakowski, Piotr Zórawski |
| 2019 | SocialTruth Project Approach to Online Disinformation (Fake News) Detection and Mitigation. Michal Choras, Marek Pawlicki, Rafal Kozik, Konstantinos P. Demestichas, Pavlos Kosmides, Manik Gupta |
| 2019 | Strong Tenant Separation in Cloud Computing Platforms. Michael Pfeiffer, Michael Rossberg, Simon Buttgereit, Guenter Schaefer |
| 2019 | The Internet Banking [in]Security Spiral: Past, Present, and Future of Online Banking Protection Mechanisms based on a Brazilian case study. Marcus Botacin, Anatoli Kalysch, André Grégio |
| 2019 | The Security Intention Meeting Series as a way to increase visibility of software security decisions in agile development projects. Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun, Kalle Rindell |
| 2019 | The power of interpretation: Qualitative methods in cybersecurity research. Damjan Fujs, Anze Mihelic, Simon L. R. Vrhovec |
| 2019 | Thieves in the Browser: Web-based Cryptojacking in the Wild. Marius Musch, Christian Wressnegger, Martin Johns, Konrad Rieck |
| 2019 | Towards Efficient Reconstruction of Attacker Lateral Movement. Florian Wilkens, Steffen Haas, Dominik Kaaser, Peter Kling, Mathias Fischer |
| 2019 | Towards Reversible Storage Network Covert Channels. Wojciech Mazurczyk, Przemyslaw Szary, Steffen Wendzel, Luca Caviglione |
| 2019 | Towards a Security Architecture for Hybrid WMNs. Markus Theil, Martin Backhaus, Michael Rossberg, Guenter Schaefer |
| 2019 | Towards a framework for detecting advanced Web bots. Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilis Katos, Stefanos Vrochidis, Yiannis Kompatsiaris |
| 2019 | Using Context and Provenance to defend against USB-borne attacks. Tobias Mueller, Ephraim Zimmer, Ludovico de Nittis |
| 2019 | Using Temporal and Topological Features for Intrusion Detection in Operational Networks. Simon D. Duque Antón, Daniel Fraunholz, Hans Dieter Schotten |
| 2019 | Zero Residual Attacks on Industrial Control Systems and Stateful Countermeasures. Hamid Reza Ghaeini, Nils Ole Tippenhauer, Jianying Zhou |
| 2019 | eBook Readers, Location Surveillance and the Threat to Freedom of Association. Stephen B. Wicker |
| 2018 | Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019. |