ARES B

116 papers

YearTitle / Authors
20204P based forensics investigation framework for smart connected toys.
Benjamin Yankson, Farkhund Iqbal, Patrick C. K. Hung
2020A case study on the representativeness of public DoS network traffic data for cybersecurity research.
Marta Catillo, Antonio Pecchia, Massimiliano Rak, Umberto Villano
2020A comparison of stream mining algorithms on botnet detection.
Guilherme Henrique Ribeiro, Elaine Ribeiro de Faria Paiva, Rodrigo Sanches Miani
2020A device identification method based on LED fingerprint for visible light communication system.
Dayu Shi, Xun Zhang, Andrei Vladimirescu, Lina Shi, Yanqi Huang, Yourong Liu
2020A framework for automated evaluation of security metrics.
Matthew Zaber, Suku Nair
2020A note on blind contact tracing at scale with applications to the COVID-19 pandemic.
Jack K. Fitzsimons, Atul Mantri, Robert Pisarczyk, Tom Rainforth, Zhikuan Zhao
2020A novel automatic discovery system of critical assets in cyberspace-oriented military missions.
Álvaro Luis Martínez, Víctor A. Villagrá González
2020A privacy-aware digital forensics investigation in enterprises.
Ludwig Englbrecht, Günther Pernul
2020A real world study on employees' susceptibility to phishing attacks.
Marco De Bona, Federica Paci
2020A semi-supervised approach for network intrusion detection.
Radoslava Svihrová, Christian Lettner
2020A silver bullet?: a comparison of accountants and developers mental models in the raise of blockchain.
Rose Esmander, Pascal Lafourcade, Marius Lombard-Platet, Claudia Negri-Ribalta
2020ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020
Melanie Volkamer, Christian Wressnegger
2020ASAINT: a spy App identification system based on network traffic.
Mauro Conti, Giulio Rigoni, Flavio Toffalini
2020AVRS: emulating AVR microcontrollers for reverse engineering and security testing.
Michael Pucher, Christian Kudera, Georg Merzdovnik
2020Advanced metering infrastructures: security risks and mitigation.
Gueltoum Bendiab, Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis, Stavros Shiaeles
2020Adversarial machine learning for spam filters.
Bhargav Kuchipudi, Ravi Teja Nannapaneni, Qi Liao
2020An empirical study on the impact of GDPR and right to be forgotten - organisations and users perspective.
Vincenzo Mangini, Irina Tal, Arghir-Nicolae Moldovan
2020An investigation on the feasibility of the bluetooth frequency hopping mechanism for the use as a covert channel technique.
Daniel Vogel, Ulugbek Akhmedjanov, Marc Ohm, Michael Meier
2020An overview of limitations and approaches in identity management.
Daniela Pöhn, Wolfgang Hommel
2020Analyzing the real-world applicability of DGA classifiers.
Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert
2020AndroPRINT: analysing the fingerprintability of the Android API.
Gerald Palfinger, Bernd Prünster
2020Anonymization of geosocial network data by the (
Jana Medková
2020AntiPatterns regarding the application of cryptographic primitives by the example of ransomware.
Michael P. Heinl, Alexander Giehl, Lukas Graif
2020Attacker-centric thinking in security: perspectives from financial services practitioners.
Caroline Moeckel
2020Automated modelling of security incidents to represent logging requirements in software systems.
Fanny Rivera-Ortiz, Liliana Pasquale
2020Automated security test generation for MQTT using attack patterns.
Hannes Sochor, Flavio Ferrarotti, Rudolf Ramler
2020Balancing trust and privacy in computer-mediated introduction: featuring risk as a determinant for trustworthiness requirements elicitation.
Angela Borchert, Nicolás E. Díaz Ferreyra, Maritta Heisel
2020Blockchain-based chain of custody: towards real-time tamper-proof evidence management.
Liza Ahmad, Salam Ismail Rasheed Khanji, Farkhund Iqbal, Faouzi Kamoun
2020Building a testing environment for SDN networks analysis for electrical grid applications.
Toni Cantero-Gubert, Alba Colet-Subirachs, Pol Paradell, José Luis Domínguez-García
2020CYSAS-S3: a novel dataset for validating cyber situational awareness related tools for supporting military operations.
Roumen Daton Medenou, Victor Manuel Calzado Mayo, Miriam Garcia Balufo, Miguel Páramo Castrillo, Francisco José González Garrido, Álvaro Luis Martínez, David Nevado Catalán, Ao Hu, David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Gerardo Ramis Pasqual De Riquelme, Antonio Berardi, Paolo De Santis, Francesco Torelli, Salvador Llopis Sánchez
2020Clust-IT: clustering-based intrusion detection in IoT environments.
Robert P. Markiewicz, Daniele Sgandurra
2020Concurrent error detection revisited: hardware protection against fault and side-channel attacks.
Jan Richter-Brockmann, Pascal Sasdrich, Florian Bache, Tim Güneysu
2020Contract-based design patterns: a design by contract approach to specify security patterns.
Caine Silva, Sylvain Guérin, Raúl Mazo, Joël Champeau
2020Cosmic rays: a neglected potential threat to evidential integrity in digital forensic investigations?
Richard E. Overill
2020Covert storage caches using the NTP protocol.
Tobias Schmidbauer, Steffen Wendzel
2020Critical traffic analysis on the tor network.
Florian Platzer, Marcel Schäfer, Martin Steinebach
2020Cyber-risk identification for a digital substation.
Athar Khodabakhsh, Sule Yildirim Yayilgan, Mohamed Abomhara, Maren Istad, Nargis Hurzuk
2020CyberWolf: assessing vulnerabilities of ICT-intensive financial markets.
Andrea Calesso, Mauro Conti, Martino Grasselli
2020Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective.
Aleksandra Pawlicka, Michal Choras, Marek Pawlicki
2020DFS
Edward Harshany, Ryan Benton, David Bourrie, Michael Black, William Bradley Glisson
2020DICE harder: a hardware implementation of the device identifier composition engine.
Lukas Jäger, Richard Petri
2020DIDEROT: an intrusion detection and prevention system for DNP3-based SCADA systems.
Panagiotis I. Radoglou-Grammatikis, Panagiotis G. Sarigiannidis, George Efstathopoulos, Paris-Alexandros Karypidis, Antonios Sarigiannidis
2020Data visualization in internet of things: tools, methodologies, and challenges.
Antonis Protopsaltis, Panagiotis G. Sarigiannidis, Dimitrios Margounakis, Anastasios Lytos
2020Denial of sustainability on military tactical clouds.
Jorge Maestre Vidal, Marco Antonio Sotelo Monge
2020Design and performance evaluation of reversible network covert channels.
Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione
2020Detecting double compression and splicing using benfords first digit law.
Raphael Antonius Frick, Huajian Liu, Martin Steinebach
2020Detection and classification of slow DoS attacks targeting network servers.
Enrico Cambiaso, Maurizio Aiello, Maurizio Mongelli, Ivan Vaccari
2020Disposable botnets: examining the anatomy of IoT botnet infrastructure.
Rui Tanabe, Tatsuya Tamai, Akira Fujita, Ryoichi Isawa, Katsunari Yoshioka, Tsutomu Matsumoto, Carlos Gañán, Michel van Eeten
2020Distinguishability of adversarial examples.
Yi Qin, Ryan Hunt, Chuan Yue
2020Distributed packet inspection for network security purposes in software-defined networking environments.
Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Marcin Gregorczyk, Maciej Purski, Wojciech Mazurczyk
2020DoH Insight: detecting DNS over HTTPS by machine learning.
Dmitrii Vekshin, Karel Hynek, Tomás Cejka
2020Dynamic risk management architecture based on heterogeneous data sources for enhancing the cyber situational awareness in organizations.
Xavier Larriva-Novo, Mario Vega-Barbas, Víctor A. Villagrá, Diego Rivera, Mario Sanz Rodrigo, Manuel Alvarez-Campana
2020Enhanced performance for the encrypted web through TLS resumption across hostnames.
Erik Sy, Moritz Moennich, Tobias Mueller, Hannes Federrath, Mathias Fischer
2020Evaluation methodology for mission-centric cyber situational awareness capabilities.
David Sandoval Rodríguez-Bermejo, Roumen Daton Medenou, Gerardo Ramis Pasqual De Riquelme, Jorge Maestre Vidal, Francesco Torelli, Salvador Llopis Sánchez
2020Exploiting minification for data hiding purposes.
Pawel Rajba, Wojciech Mazurczyk
2020Exploring data leakage in encrypted payload using supervised machine learning.
Amir Khaleghi Moghaddam, Nur Zincir-Heywood
2020Factors affecting the market adoption of cyber-security products in energy and electrical systems: the case of SPEAR.
Theodoros Rokkas, Ioannis Neokosmidis
2020Feasibility study of a camera-based PUF in a realistic scenario.
Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon
2020Fighting N-day vulnerabilities with automated CVSS vector prediction at disclosure.
Clément Elbaz, Louis Rilling, Christine Morin
2020Formalising fault injection and countermeasures.
Thomas Given-Wilson, Axel Legay
2020Generalizing the phishing principle: analyzing user behavior in response to controlled stimuli for IT security awareness assessment.
Arnold Sykosch, Christian Doll, Matthias Wübbeling, Michael Meier
2020HIP: HSM-based identities for plug-and-charge.
Andreas Fuchs, Dustin Kern, Christoph Krauß, Maria Zhdanova
2020How do app vendors respond to subject access requests?: a longitudinal privacy study on iOS and Android Apps.
Jacob Leon Kröger, Jens Lindemann, Dominik Herrmann
2020INSPIRE-5Gplus: intelligent security and pervasive trust for 5G and beyond networks.
Jordi Ortiz, Ramon Sanchez-Iborra, Jorge Bernal Bernabé, Antonio F. Skarmeta, Chafika Benzaid, Tarik Taleb, Pol Alemany, Raul Muñoz, Ricard Vilalta, Chrystel Gaber, Jean-Philippe Wary, Dhouha Ayed, Pascal Bisson, Maria Christopoulou, George Xilouris, Edgardo Montes de Oca, Gürkan Gür, Gianni Santinelli, Vincent Lefebvre, Antonio Pastor, Diego R. López
2020Improving security in industry 4.0 by extending OPC-UA with usage control.
Fabio Martinelli, Oleksii Osliak, Paolo Mori, Andrea Saracino
2020Integrating digital twin security simulations in the security operations center.
Marietheres Dietz, Manfred Vielberth, Günther Pernul
2020Investigation into the security and privacy of iOS VPN applications.
Jack Wilson, David McLuskie, Ethan Bayne
2020IoT dataset generation framework for evaluating anomaly detection mechanisms.
Andreas Meyer-Berg, Rolf Egert, Leon Böck, Max Mühlhäuser
2020Jit fault detection: increasing availability in 1oo2 systems just-in-time.
Leo Botler, Nermin Kajtazovic, Konrad Diwold, Kay Römer
2020Leveraging eBPF to preserve user privacy for DNS, DoT, and DoH queries.
Sean Rivera, Vijay K. Gurbani, Sofiane Lagraa, Antonio Ken Iannillo, Radu State
2020Locality sensitive hashing for tampering detection in automotive systems.
Roland Bolboaca, Teri Lenard, Béla Genge, Piroska Haller
2020MP2ML: a mixed-protocol machine learning framework for private inference.
Fabian Boemer, Rosario Cammarota, Daniel Demmler, Thomas Schneider, Hossein Yalame
2020Machine learning for tree structures in fake site detection.
Taichi Ishikawa, Yu-Lu Liu, David Lawrence Shepard, Kilho Shin
2020Making use of NXt to nothing: the effect of class imbalances on DGA detection classifiers.
Arthur Drichel, Ulrike Meyer, Samuel Schüppen, Dominik Teubert
2020Memory corruption attacks within Android TEEs: a case study based on OP-TEE.
Fabian Fleischer, Marcel Busch, Phillip Kuhrt
2020Mixed-code text analysis for the detection of online hidden propaganda.
Andrea Tundis, Gaurav Mukherjee, Max Mühlhäuser
2020Negative filtering of CCTV Content - forensic video analysis framework.
Franck Jeveme Panta, André Péninou, Florence Sèdes
2020Network covert channels detection using data mining and hierarchical organisation of frequent sets: an initial study.
Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk
2020Non-blind steganalysis.
Niklas Bunzel, Martin Steinebach, Huajian Liu
2020On the importance of cyber-security training for multi-vector energy distribution system operators.
Dimitrios Vozikis, Eleni Darra, Tanel Kuusk, Dimitris Kavallieros, Aare Reintam, Xavier J. A. Bellekens
2020PaperW8: an IoT bricking ransomware proof of concept.
Calvin Brierley, Jamie Pont, Budi Arief, David J. Barnes, Julio C. Hernandez-Castro
2020Post-mortem digital forensic artifacts of TikTok Android App.
Patrício Domingues, Ruben Nogueira, José Carlos Francisco, Miguel Frade
2020Post-quantum MACsec key agreement for ethernet networks.
Joo Yeon Cho, Andrew Sergeev
2020Privacy threats in low-cost people counting devices.
Niccolò Maltoni, Antonio Magnani, Luca Calderoni
2020Privacy-enhanced robust image hashing with bloom filters.
Uwe Breidenbach, Martin Steinebach, Huajian Liu
2020Quantifying autonomous system IP churn using attack traffic of botnets.
Harm Griffioen, Christian Doerr
2020RESCURE: a security solution for IoT life cycle.
Georgios N. Selimis, Rui Wang, Roel Maes, Geert Jan Schrijen, Mario Münzer, Stefan Ilic, Frans M. J. Willems, Lieneke Kusters
2020Ransomware 2.0: to sell, or not to sell a game-theoretical model of data-selling Ransomware.
Zhen Li, Qi Liao
2020Real-time stream processing tool for detecting suspicious network patterns using machine learning.
Mikolaj Komisarek, Michal Choras, Rafal Kozik, Marek Pawlicki
2020Refining the evaluation of the degree of security of a system built using security patterns.
Olga Villagrán-Velasco, Eduardo B. Fernández, Jorge L. Ortega-Arjona
2020Relaxation time in complex network.
Dmytro V. Lande, Andrei Snarskii, Oleh O. Dmytrenko, Igor Subach
2020SCF
Sepideh Pouyanrad, Jan Tobias Mühlberg, Wouter Joosen
2020SOK: cryptocurrency networking context, state-of-the-art, challenges.
Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, Aviv Zohar
2020STALK: security analysis of smartwatches for kids.
Christoph Saatjohann, Fabian Ising, Luise Krings, Sebastian Schinzel
2020Security assurance cases for road vehicles: an industry perspective.
Mazen Mohamad, Alexander Åström, Örjan Askerdal, Jörgen Borg, Riccardo Scandariato
2020Security impacts of sub-optimal DevSecOps implementations in a highly regulated environment.
Jose Andre Morales, Thomas P. Scanlon, Aaron Volkmann, Joseph Yankel, Hasan Yasar
2020SoK: a taxonomy for anomaly detection in wireless sensor networks focused on node-level techniques.
Dominik Widhalm, Karl M. Göschka, Wolfgang Kastner
2020SoK: contemporary issues and challenges to enable cyber situational awareness for network security.
Martin Husák, Tomás Jirsík, Shanchieh Jay Yang
2020SoK: engineering privacy-aware high-tech systems.
Giovanni Maria Riva, Alexandr Vasenev, Nicola Zannone
2020SoK: exploring the state of the art and the future potential of artificial intelligence in digital forensic investigation.
Xiaoyu Du, Chris Hargreaves, John Sheppard, Felix Anda, Asanka P. Sayakkara, Nhien-An Le-Khac, Mark Scanlon
2020SoK: linking information security metrics to management success factors.
Rainer Diesch, Helmut Krcmar
2020SoK: why Johnny can't fix PGP standardization.
Harry Halpin
2020Stegomalware detection through structural analysis of media files.
Damian Puchalski, Luca Caviglione, Rafal Kozik, Adrian Marzecki, Slawomir Krawczyk, Michal Choras
2020Subverting Linux' integrity measurement architecture.
Felix Bohling, Tobias Mueller, Michael Eckel, Jens Lindemann
2020SysGen: system state corpus generator.
Ben Lenard, James Wagner, Alexander Rasin, Jonathan Grier
2020TAVeer: an interpretable topic-agnostic authorship verification method.
Oren Halvani, Lukas Graner, Roey Regev
2020Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things.
Omair Faraj, David Megías, Abdel-Mehsen Ahmad, Joaquín García-Alfaro
2020Template-based Android inter process communication fuzzing.
Anatoli Kalysch, Mark Deutel, Tilo Müller
2020Testing the effectiveness of tailored phishing techniques in industry and academia: a field experiment.
Pavlo Burda, Tzouliano Chotza, Luca Allodi, Nicola Zannone
2020Threat landscape for smart grid systems.
Christos-Minas Mathas, Konstantinos-Panagiotis Grammatikakis, Costas Vassilakis, Nicholas Kolokotronis, Vasiliki-Georgia Bilali, Dimitris Kavallieros
2020To tweet or not to tweet: covertly manipulating a Twitter debate on vaccines using malware-induced misperceptions.
Filipo Sharevski, Peter Jachim, Kevin Florek
2020Towards detection of software supply chain attacks by forensic artifacts.
Marc Ohm, Arnold Sykosch, Michael Meier
2020Towards the performance evaluation of a clustering and trust based security mechanism for VANET.
Amira Kchaou, Ryma Abassi, Sihem Guemara El Fatmi
2020Towards using differentially private synthetic data for machine learning in collaborative data science projects.
Michael Holmes, George Theodorakopoulos
2020Vector packet encapsulation: the case for a scalable IPsec encryption protocol.
Michael Pfeiffer, Franz Girlich, Michael Rossberg, Guenter Schaefer
2020VisualDroid: automatic triage and detection of Android repackaged applications.
Rosangela Casolare, Carlo De Dominicis, Fabio Martinelli, Francesco Mercaldo, Antonella Santone