| 2020 | 4P based forensics investigation framework for smart connected toys. Benjamin Yankson, Farkhund Iqbal, Patrick C. K. Hung |
| 2020 | A case study on the representativeness of public DoS network traffic data for cybersecurity research. Marta Catillo, Antonio Pecchia, Massimiliano Rak, Umberto Villano |
| 2020 | A comparison of stream mining algorithms on botnet detection. Guilherme Henrique Ribeiro, Elaine Ribeiro de Faria Paiva, Rodrigo Sanches Miani |
| 2020 | A device identification method based on LED fingerprint for visible light communication system. Dayu Shi, Xun Zhang, Andrei Vladimirescu, Lina Shi, Yanqi Huang, Yourong Liu |
| 2020 | A framework for automated evaluation of security metrics. Matthew Zaber, Suku Nair |
| 2020 | A note on blind contact tracing at scale with applications to the COVID-19 pandemic. Jack K. Fitzsimons, Atul Mantri, Robert Pisarczyk, Tom Rainforth, Zhikuan Zhao |
| 2020 | A novel automatic discovery system of critical assets in cyberspace-oriented military missions. Álvaro Luis Martínez, Víctor A. Villagrá González |
| 2020 | A privacy-aware digital forensics investigation in enterprises. Ludwig Englbrecht, Günther Pernul |
| 2020 | A real world study on employees' susceptibility to phishing attacks. Marco De Bona, Federica Paci |
| 2020 | A semi-supervised approach for network intrusion detection. Radoslava Svihrová, Christian Lettner |
| 2020 | A silver bullet?: a comparison of accountants and developers mental models in the raise of blockchain. Rose Esmander, Pascal Lafourcade, Marius Lombard-Platet, Claudia Negri-Ribalta |
| 2020 | ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020 Melanie Volkamer, Christian Wressnegger |
| 2020 | ASAINT: a spy App identification system based on network traffic. Mauro Conti, Giulio Rigoni, Flavio Toffalini |
| 2020 | AVRS: emulating AVR microcontrollers for reverse engineering and security testing. Michael Pucher, Christian Kudera, Georg Merzdovnik |
| 2020 | Advanced metering infrastructures: security risks and mitigation. Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles |
| 2020 | Adversarial machine learning for spam filters. Bhargav Kuchipudi, Ravi Teja Nannapaneni, Qi Liao |
| 2020 | An empirical study on the impact of GDPR and right to be forgotten - organisations and users perspective. Vincenzo Mangini, Irina Tal, Arghir-Nicolae Moldovan |
| 2020 | An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique. Daniel Vogel, Ulugbek Akhmedjanov, Marc Ohm, Michael Meier |
| 2020 | An overview of limitations and approaches in identity management. Daniela Pöhn, Wolfgang Hommel |
| 2020 | Analyzing the real-world applicability of DGA classifiers. Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert |
| 2020 | AndroPRINT: analysing the fingerprintability of the Android API. Gerald Palfinger, Bernd Prünster |
| 2020 | Anonymization of geosocial network data by the ( Jana Medková |
| 2020 | AntiPatterns regarding the application of cryptographic primitives by the example of ransomware. Michael P. Heinl, Alexander Giehl, Lukas Graif |
| 2020 | Attacker-centric thinking in security: perspectives from financial services practitioners. Caroline Moeckel |
| 2020 | Automated modelling of security incidents to represent logging requirements in software systems. Fanny Rivera-Ortiz, Liliana Pasquale |
| 2020 | Automated security test generation for MQTT using attack patterns. Hannes Sochor, Flavio Ferrarotti, Rudolf Ramler |
| 2020 | Balancing trust and privacy in computer-mediated introduction: featuring risk as a determinant for trustworthiness requirements elicitation. Angela Borchert, Nicolás E. Díaz Ferreyra, Maritta Heisel |
| 2020 | Blockchain-based chain of custody: towards real-time tamper-proof evidence management. Liza Ahmad, Salam Ismail Rasheed Khanji, Farkhund Iqbal, Faouzi Kamoun |
| 2020 | Building a testing environment for SDN networks analysis for electrical grid applications. Toni Cantero-Gubert, Alba Colet-Subirachs, Pol Paradell, José Luis Domínguez-García |
| 2020 | CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operations. Roumen Daton Medenou, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido, Álvaro Luis Martínez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Gerardo Ramis Pasqual De Riquelme, Antonio Berardi, Paolo De Santis, Francesco Torelli, Salvador Llopis Sánchez |
| 2020 | Clust-IT: clustering-based intrusion detection in IoT environments. Robert P. Markiewicz, Daniele Sgandurra |
| 2020 | Concurrent error detection revisited: hardware protection against fault and side-channel attacks. Jan Richter-Brockmann, Pascal Sasdrich, Florian Bache, Tim Güneysu |
| 2020 | Contract-based design patterns: a design by contract approach to specify security patterns. Caine Silva, Sylvain Guérin, Raúl Mazo, Joël Champeau |
| 2020 | Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations? Richard E. Overill |
| 2020 | Covert storage caches using the NTP protocol. Tobias Schmidbauer, Steffen Wendzel |
| 2020 | Critical traffic analysis on the tor network. Florian Platzer, Marcel Schäfer, Martin Steinebach |
| 2020 | Cyber-risk identification for a digital substation. Athar Khodabakhsh, Sule Yildirim Yayilgan, Mohamed Abomhara, Maren Istad, Nargis Hurzuk |
| 2020 | CyberWolf: assessing vulnerabilities of ICT-intensive financial markets. Andrea Calesso, Mauro Conti, Martino Grasselli |
| 2020 | Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. Aleksandra Pawlicka, Michal Choras, Marek Pawlicki |
| 2020 | DFS Edward Harshany, Ryan Benton, David Bourrie, Michael Black, William Bradley Glisson |
| 2020 | DICE harder: a hardware implementation of the device identifier composition engine. Lukas Jäger, Richard Petri |
| 2020 | DIDEROT: an intrusion detection and prevention system for DNP3-based SCADA systems. Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, George Efstathopoulos, Paris-Alexandros Karypidis, Antonios Sarigiannidis |
| 2020 | Data visualization in internet of things: tools, methodologies, and challenges. Antonis Protopsaltis, Panagiotis G. Sarigiannidis, Dimitrios Margounakis, Anastasios Lytos |
| 2020 | Denial of sustainability on military tactical clouds. Jorge Maestre Vidal, Marco Antonio Sotelo Monge |
| 2020 | Design and performance evaluation of reversible network covert channels. Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione |
| 2020 | Detecting double compression and splicing using benfords first digit law. Raphael Antonius Frick, Huajian Liu, Martin Steinebach |
| 2020 | Detection and classification of slow DoS attacks targeting network servers. Enrico Cambiaso, Maurizio Aiello, Maurizio Mongelli, Ivan Vaccari |
| 2020 | Disposable botnets: examining the anatomy of IoT botnet infrastructure. Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Gañán, Michel van Eeten |
| 2020 | Distinguishability of adversarial examples. Yi Qin, Ryan Hunt, Chuan Yue |
| 2020 | Distributed packet inspection for network security purposes in software-defined networking environments. Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Marcin Gregorczyk, Maciej Purski, Wojciech Mazurczyk |
| 2020 | DoH Insight: detecting DNS over HTTPS by machine learning. Dmitrii Vekshin, Karel Hynek, Tomás Cejka |
| 2020 | Dynamic risk management architecture based on heterogeneous data sources for enhancing the cyber situational awareness in organizations. Xavier Larriva-Novo, Mario Vega-Barbas, Víctor A. Villagrá, Diego Rivera, Mario Sanz Rodrigo, Manuel Alvarez-Campana |
| 2020 | Enhanced performance for the encrypted web through TLS resumption across hostnames. Erik Sy, Moritz Moennich, Tobias Mueller, Hannes Federrath, Mathias Fischer |
| 2020 | Evaluation methodology for mission-centric cyber situational awareness capabilities. David Sandoval Rodríguez-Bermejo, Roumen Daton Medenou, Gerardo Ramis Pasqual De Riquelme, Jorge Maestre Vidal, Francesco Torelli, Salvador Llopis Sánchez |
| 2020 | Exploiting minification for data hiding purposes. Pawel Rajba, Wojciech Mazurczyk |
| 2020 | Exploring data leakage in encrypted payload using supervised machine learning. Amir Khaleghi Moghaddam, Nur Zincir-Heywood |
| 2020 | Factors affecting the market adoption of cyber-security products in energy and electrical systems: the case of SPEAR. Theodoros Rokkas, Ioannis Neokosmidis |
| 2020 | Feasibility study of a camera-based PUF in a realistic scenario. Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon |
| 2020 | Fighting N-day vulnerabilities with automated CVSS vector prediction at disclosure. Clément Elbaz, Louis Rilling, Christine Morin |
| 2020 | Formalising fault injection and countermeasures. Thomas Given-Wilson, Axel Legay |
| 2020 | Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessment. Arnold Sykosch, Christian Doll, Matthias Wübbeling, Michael Meier |
| 2020 | HIP: HSM-based identities for plug-and-charge. Andreas Fuchs, Dustin Kern, Christoph Krauß, Maria Zhdanova |
| 2020 | How do app vendors respond to subject access requests?: a longitudinal privacy study on iOS and Android Apps. Jacob Leon Kröger, Jens Lindemann, Dominik Herrmann |
| 2020 | INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks. Jordi Ortiz, Ramon Sanchez-Iborra, Jorge Bernal Bernabé, Antonio F. Skarmeta, Chafika Benzaid, Tarik Taleb, Pol Alemany, Raul Muñoz, Ricard Vilalta, Chrystel Gaber, Jean-Philippe Wary, Dhouha Ayed, Pascal Bisson, Maria Christopoulou, George Xilouris, Edgardo Montes de Oca, Gürkan Gür, Gianni Santinelli, Vincent Lefebvre, Antonio Pastor, Diego R. López |
| 2020 | Improving security in industry 4.0 by extending OPC-UA with usage control. Fabio Martinelli, Oleksii Osliak, Paolo Mori, Andrea Saracino |
| 2020 | Integrating digital twin security simulations in the security operations center. Marietheres Dietz, Manfred Vielberth, Günther Pernul |
| 2020 | Investigation into the security and privacy of iOS VPN applications. Jack Wilson, David McLuskie, Ethan Bayne |
| 2020 | IoT dataset generation framework for evaluating anomaly detection mechanisms. Andreas Meyer-Berg, Rolf Egert, Leon Böck, Max Mühlhäuser |
| 2020 | Jit fault detection: increasing availability in 1oo2 systems just-in-time. Leo Botler, Nermin Kajtazovic, Konrad Diwold, Kay Römer |
| 2020 | Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries. Sean Rivera, Vijay K. Gurbani, Sofiane Lagraa, Antonio Ken Iannillo, Radu State |
| 2020 | Locality sensitive hashing for tampering detection in automotive systems. Roland Bolboaca, Teri Lenard, Béla Genge, Piroska Haller |
| 2020 | MP2ML: a mixed-protocol machine learning framework for private inference. Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame |
| 2020 | Machine learning for tree structures in fake site detection. Taichi Ishikawa, Yu-Lu Liu, David Lawrence Shepard, Kilho Shin |
| 2020 | Making use of NXt to nothing: the effect of class imbalances on DGA detection classifiers. Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert |
| 2020 | Memory corruption attacks within Android TEEs: a case study based on OP-TEE. Fabian Fleischer, Marcel Busch, Phillip Kuhrt |
| 2020 | Mixed-code text analysis for the detection of online hidden propaganda. Andrea Tundis, Gaurav Mukherjee, Max Mühlhäuser |
| 2020 | Negative filtering of CCTV Content - forensic video analysis framework. Franck Jeveme Panta, André Péninou, Florence Sèdes |
| 2020 | Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study. Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk |
| 2020 | Non-blind steganalysis. Niklas Bunzel, Martin Steinebach, Huajian Liu |
| 2020 | On the importance of cyber-security training for multi-vector energy distribution system operators. Dimitrios Vozikis, Eleni Darra, Tanel Kuusk, Dimitris Kavallieros, Aare Reintam, Xavier J. A. Bellekens |
| 2020 | PaperW8: an IoT bricking ransomware proof of concept. Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro |
| 2020 | Post-mortem digital forensic artifacts of TikTok Android App. Patrício Domingues, Ruben Nogueira, José Carlos Francisco, Miguel Frade |
| 2020 | Post-quantum MACsec key agreement for ethernet networks. Joo Yeon Cho, Andrew Sergeev |
| 2020 | Privacy threats in low-cost people counting devices. Niccolò Maltoni, Antonio Magnani, Luca Calderoni |
| 2020 | Privacy-enhanced robust image hashing with bloom filters. Uwe Breidenbach, Martin Steinebach, Huajian Liu |
| 2020 | Quantifying autonomous system IP churn using attack traffic of botnets. Harm Griffioen, Christian Doerr |
| 2020 | RESCURE: a security solution for IoT life cycle. Georgios N. Selimis, Rui Wang, Roel Maes, Geert Jan Schrijen, Mario Münzer, Stefan Ilic, Frans M. J. Willems, Lieneke Kusters |
| 2020 | Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling Ransomware. Zhen Li, Qi Liao |
| 2020 | Real-time stream processing tool for detecting suspicious network patterns using machine learning. Mikolaj Komisarek, Michal Choras, Rafal Kozik, Marek Pawlicki |
| 2020 | Refining the evaluation of the degree of security of a system built using security patterns. Olga Villagrán-Velasco, Eduardo B. Fernández, Jorge L. Ortega-Arjona |
| 2020 | Relaxation time in complex network. Dmytro V. Lande, Andrei Snarskii, Oleh O. Dmytrenko, Igor Subach |
| 2020 | SCF Sepideh Pouyanrad, Jan Tobias Mühlberg, Wouter Joosen |
| 2020 | SOK: cryptocurrency networking context, state-of-the-art, challenges. Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, Aviv Zohar |
| 2020 | STALK: security analysis of smartwatches for kids. Christoph Saatjohann, Fabian Ising, Luise Krings, Sebastian Schinzel |
| 2020 | Security assurance cases for road vehicles: an industry perspective. Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato |
| 2020 | Security impacts of sub-optimal DevSecOps implementations in a highly regulated environment. Jose Andre Morales, Thomas P. Scanlon, Aaron Volkmann, Joseph Yankel, Hasan Yasar |
| 2020 | SoK: a taxonomy for anomaly detection in wireless sensor networks focused on node-level techniques. Dominik Widhalm, Karl M. Göschka, Wolfgang Kastner |
| 2020 | SoK: contemporary issues and challenges to enable cyber situational awareness for network security. Martin Husák, Tomás Jirsík, Shanchieh Jay Yang |
| 2020 | SoK: engineering privacy-aware high-tech systems. Giovanni Maria Riva, Alexandr Vasenev, Nicola Zannone |
| 2020 | SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation. Xiaoyu Du, Chris Hargreaves, John Sheppard, Felix Anda, Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon |
| 2020 | SoK: linking information security metrics to management success factors. Rainer Diesch, Helmut Krcmar |
| 2020 | SoK: why Johnny can't fix PGP standardization. Harry Halpin |
| 2020 | Stegomalware detection through structural analysis of media files. Damian Puchalski, Luca Caviglione, Rafal Kozik, Adrian Marzecki, Slawomir Krawczyk, Michal Choras |
| 2020 | Subverting Linux' integrity measurement architecture. Felix Bohling, Tobias Mueller, Michael Eckel, Jens Lindemann |
| 2020 | SysGen: system state corpus generator. Ben Lenard, James Wagner, Alexander Rasin, Jonathan Grier |
| 2020 | TAVeer: an interpretable topic-agnostic authorship verification method. Oren Halvani, Lukas Graner, Roey Regev |
| 2020 | Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things. Omair Faraj, David Megías, Abdel-Mehsen Ahmad, Joaquín García-Alfaro |
| 2020 | Template-based Android inter process communication fuzzing. Anatoli Kalysch, Mark Deutel, Tilo Müller |
| 2020 | Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment. Pavlo Burda, Tzouliano Chotza, Luca Allodi, Nicola Zannone |
| 2020 | Threat landscape for smart grid systems. Christos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis, Costas Vassilakis, Nicholas Kolokotronis, Vasiliki-Georgia Bilali, Dimitris Kavallieros |
| 2020 | To tweet or not to tweet: covertly manipulating a Twitter debate on vaccines using malware-induced misperceptions. Filipo Sharevski, Peter Jachim, Kevin Florek |
| 2020 | Towards detection of software supply chain attacks by forensic artifacts. Marc Ohm, Arnold Sykosch, Michael Meier |
| 2020 | Towards the performance evaluation of a clustering and trust based security mechanism for VANET. Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi |
| 2020 | Towards using differentially private synthetic data for machine learning in collaborative data science projects. Michael Holmes, George Theodorakopoulos |
| 2020 | Vector packet encapsulation: the case for a scalable IPsec encryption protocol. Michael Pfeiffer, Franz Girlich, Michael Rossberg, Guenter Schaefer |
| 2020 | VisualDroid: automatic triage and detection of Android repackaged applications. Rosangela Casolare, Carlo De Dominicis, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |