ARES B

161 papers

YearTitle / Authors
20215Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection.
Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca
2021A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol.
Qi Liu, Hubert B. Keller, Veit Hagenmeyer
2021A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection.
Panagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis
2021A Formal Analysis of EnOcean's Teach-in and Authentication.
Katharina Hofer-Schmitz
2021A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports.
Tore Kasper Frederiksen
2021A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs.
Mahmoud Abdallah, Nhien-An Le-Khac, Hamed Z. Jahromi, Anca Delia Jurcut
2021A Machine Learning Driven Threat Intelligence System for Malicious URL Detection.
Rupa Chiramdasu, Gautam Srivastava, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu
2021A Medium-Interaction Emulation and Monitoring System for Operational Technology.
Stefano Bistarelli, Emanuele Bosimini, Francesco Santini
2021A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection.
Stefano Petrocchi, Giacomo Giorgi, Mario G. C. A. Cimino
2021A Recommender System for Tracking Vulnerabilities.
Philip Dale Huff, Kylie McClanahan, Thao Le, Qinghua Li
2021A Revised Taxonomy of Steganography Embedding Patterns.
Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert
2021A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis.
Salatiel Ezennaya-Gomez, Stefan Kiltz, Christian Kraetzer, Jana Dittmann
2021A Serious Game Design Framework for Software Developers to Put GDPR into Practice.
Abdulrahman Alhazmi, Nalin A. G. Arachchilage
2021A Systematic Analysis of Covert Channels in the Network Time Protocol.
Jonas Hielscher, Kevin Lamshöft, Christian Krätzer, Jana Dittmann
2021A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi.
Iván García Aguilar, Antonio Muñoz Gallego
2021A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs.
Max van Haastrecht, Injy Sarhan, Alireza Shojaifar, Louis Baumgartner, Wissam Mallouli, Marco Spruit
2021A clustering approach to anonymize locations during dataset de-identification.
Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens
2021A web tool for analyzing FIDO2/WebAuthn Requests and Responses.
Athanasios Vasileios Grammatopoulos, Ilias Politis, Christos Xenakis
2021ABEBox: A data driven access control for securing public cloud storage with efficient key revocation.
Emanuele Raso, Lorenzo Bracciale, Pierpaolo Loreti, Giuseppe Bianchi
2021AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm.
Pantaleone Nespoli, Félix Gómez Mármol, Georgios Kambourakis
2021ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021
Delphine Reinhardt, Tilo Müller
2021Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG).
Cassius Puodzius, Olivier Zendra, Annelie Heuser, Lamine Noureddine
2021Adaptive Mitigation of Tactical Denial of Sustainability.
Marco Antonio Sotelo Monge, Jorge Maestre Vidal, Roumen Daton Medenou Choumanof
2021Adversarial Examples Against a BERT ABSA Model - Fooling Bert With L33T, Misspellign, and Punctuation, .
Nora Hofer, Pascal Schöttle, Alexander Rietzler, Sebastian Stabinger
2021An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case.
Christian Wolschke, Stefan Marksteiner, Tobias Braun, Markus Wolf
2021An Indicators-of-Risk Library for Industrial Network Security.
Carolina Adaros Boye, Paul Kearney, Mark B. Josephs, Hans Ulmer
2021An exploratory analysis on the impact of Shodan scanning tool on the network attacks.
Andrea Tundis, Eric Marc Modo Nga, Max Mühlhäuser
2021Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods.
Daniel Zelle, Timm Lauser, Dustin Kern, Christoph Krauß
2021Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems.
Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos
2021Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks.
Tom Neubert, Claus Vielhauer, Christian Kraetzer
2021Best Practices for Notification Studiesfor Security and Privacy Issues on the Internet.
Max Maaß, Henning Pridöhl, Dominik Herrmann, Matthias Hollick
2021Bloom Filter based Collective Remote Attestation for Dynamic Networks.
Salvatore Frontera, Riccardo Lazzeretti
2021Building Open Source Cyber Range To Teach Cyber Security.
Tomás Lieskovan, Jan Hajny
2021Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges.
Jörg Keller
2021Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting.
Mónica P. Arenas, Hüseyin Demirci, Gabriele Lenzini
2021Classifying SMEs for Approaching Cybersecurity Competence and Awareness.
Alireza Shojaifar, Heini Järvinen
2021Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection.
Bram van Dooremaal, Pavlo Burda, Luca Allodi, Nicola Zannone
2021Continuous User Authentication for Human-Robot Collaboration.
Shurook S. Almohamade, John A. Clark, James Law
2021Control Effectiveness: a Capture-the-Flag Study.
Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese
2021Crème de la Crème: Lessons from Papers in Security Publications.
Simon Vrhovec, Luca Caviglione, Steffen Wendzel
2021Cybersecurity Curricula Designer.
Jan Hajny, Sara Ricci, Edmundas Piesarskas, Marek Sikora
2021DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning.
David Megías, Minoru Kuribayashi, Andrea Rosales, Wojciech Mazurczyk
2021Data Hiding Using Code Obfuscation.
Pawel Rajba, Wojciech Mazurczyk
2021DeCanSec: A Decentralized Architecture for Secure Statistical Computations on Distributed Health Registry Data.
Narasimha Raghavan Veeraragavan, Jan Franz Nygård
2021Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic.
Pascal Wichmann, Matthias Marx, Hannes Federrath, Mathias Fischer
2021Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach.
Javad Forough, Monowar Bhuyan, Erik Elmroth
2021Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental Study.
Ankur Chattopadhyay, Robert Ruska Jr., Levi Pfantz
2021Discovery of Single-Vendor Marketplace Operators in the Tor-Network.
Fabian Brenner, Florian Platzer, Martin Steinebach
2021Do Security Reports Meet Usability?: Lessons Learned from Using Actionable Mitigations for Patching TLS Misconfigurations.
Salvatore Manfredi, Mariano Ceccato, Giada Sciarretta, Silvio Ranise
2021DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections.
Umberto Morelli, Ivan Vaccari, Silvio Ranise, Enrico Cambiaso
2021Efficient Error Prediction for Differentially Private Algorithms.
Boel Nelson
2021Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks.
Aidmar Wainakh, Aleksej Strassheim, Tim Grube, Jörg Daubert, Max Mühlhäuser
2021Evaluating the Data Inconsistency of Open-Source Vulnerability Repositories.
Yuning Jiang, Manfred A. Jeusfeld, Jianguo Ding
2021Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia.
Muhammad Ali Fauzi, Prosper Kandabongee Yeng, Bian Yang, Dita Rachmayani
2021FADE: Detecting Fake News Articles on the Web.
Bahruz Jabiyev, Sinan Pehlivanoglu, Kaan Onarlioglu, Engin Kirda
2021Fighting organized crime by automatically detecting money laundering-related financial transactions.
Andrea Tundis, Soujanya Nemalikanti, Max Mühlhäuser
2021Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs.
Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer
2021First Step Towards EXPLAINable DGA Multiclass Classification.
Arthur Drichel, Nils Faerber, Ulrike Meyer
2021Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts.
Tyler Balon, Krikor Herlopian, Ibrahim M. Baggili, Cinthya Grajeda-Mendez
2021Forensicast: A Non-intrusive Approach & Tool For Logical Forensic Acquisition & Analysis of The Google Chromecast TV.
Alex Sitterer, Nicholas Dubois, Ibrahim M. Baggili
2021Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs.
Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi
2021Formal Validation of a Security Mechanism against the RSU Compromise Attack.
Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss, Sihem Guemara El Fatmi
2021From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms.
Clemens Sauerwein, Daniel Fischer, Milena Rubsamen, Guido Rosenberger, Dirk Stelzer, Ruth Breu
2021GEIGER: Solution for small businesses to protect themselves against cyber-threats.
José Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht
2021Grand Theft App: Digital Forensics of Vehicle Assistant Apps.
Simon Ebbers, Fabian Ising, Christoph Saatjohann, Sebastian Schinzel
2021Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training.
Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu
2021How Lightning's Routing Diminishes its Anonymity.
Satwik Prabhu Kumble, Dick H. J. Epema, Stefanie Roos
2021How Private is Android's Private DNS Setting? Identifying Apps by Encrypted DNS Traffic.
Michael Mühlhauser, Henning Pridöhl, Dominik Herrmann
2021Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels.
Tobias Schmidbauer, Steffen Wendzel
2021I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts.
Enrico Bacis, Dario Facchinetti, Marco Guarnieri, Marco Rosa, Matthew Rossi, Stefano Paraboschi
2021Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs.
Sara Ricci, Lukas Malina, Petr Jedlicka, David Smékal, Jan Hajny, Peter Cíbik, Petr Dzurenda, Patrik Dobias
2021In-vehicle detection of targeted CAN bus attacks.
Florian Fenzl, Roland Rieke, Andreas Dominik
2021Information Security Analysis in the Passenger-Autonomous Vehicle Interaction.
Mariia Bakhtina, Raimundas Matulevicius
2021Information Security Assessment and Certification within Supply Chains.
Henrique Santos, André Oliveira, Lúcia Soares, Alan Satis, Alexandre J. T. Santos
2021Integer Overflow Detection with Delayed Runtime Test.
Zhen Huang, Xiaowei Yu
2021Integrating Security Behavior into Attack Simulations.
Simon Hacks, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou, Ariadni Michalitsi-Psarrou
2021Irish Attitudes Toward COVID Tracker App & Privacy: Sentiment Analysis on Twitter and Survey Data.
Pintu Lohar, Guodong Xie, Malika Bendechache, Rob Brennan, Edoardo Celeste, Ramona Trestian, Irina Tal
2021JPEG File Fragmentation Point Detection using Huffman Code and Quantization Array Validation.
Vincent van der Meer, Jeroen van den Bos
2021Linking CVE's to MITRE ATT&CK Techniques.
Aditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac
2021Listen to Your Heart: Evaluation of the Cardiologic Ecosystem.
Endres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel
2021Location Security under Reference Signals' Spoofing Attacks: Threat Model and Bounds.
Stefania Bartoletti, Giuseppe Bianchi, Danilo Orlando, Ivan Palamà, Nicola Blefari-Melazzi
2021Log Abstraction for Information Security: Heuristics and Reproducibility.
Rafael Copstein, Jeff Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood
2021MESH: A Memory-Efficient Safe Heap for C/C++.
Emanuel Q. Vintila, Philipp Zieris, Julian Horsch
2021MI-LXC: A Small-Scale Internet-Like Environment for Network Security Teaching.
François Lesueur, Camille Noûs
2021Madrid Quantum Network: A First Step to Quantum Internet.
Marta Irene García Cid, Laura Ortiz Martín, Vicente Martín Ayuso
2021Managing Anonymous Keys in a Fog-Computing Platform.
Raphael Schermann, Ronald Toegl
2021Message-of-the-Day (MOTD) Banner Language Variations as an Adaptive Honeypot Deterrent of Unauthorized Access.
Filipo Sharevski, Samuel Jevitz
2021Modeling of Personalized Privacy Disclosure Behavior: A Formal Method Approach.
A. K. M. Nuhil Mehdy, Hoda Mehrpouyan
2021Multi-View Learning for Repackaged Malware Detection.
Shirish Kumar Singh, Kushagra Chaturvedy, Bharavi Mishra
2021Nautilus: A Tool For Automated Deployment And Sharing Of Cyber Range Scenarios.
Giorgio Bernardinetti, Stefano Iafrate, Giuseppe Bianchi
2021Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels.
Yulduz Khodjaeva, Nur Zincir-Heywood
2021Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project.
Mikolaj Komisarek, Marek Pawlicki, Mikolaj Kowalski, Adrian Marzecki, Rafal Kozik, Michal Choras
2021Nori: Concealing the Concealed Identifier in 5G.
John Preuß Mattsson, Prajwol Kumar Nakarmi
2021OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases.
Philipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter
2021Obstacles and Challenges in Transforming Applications for Distributed Data Ledger Integration.
Martin Pirker, Ernst Piller
2021On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web.
George Pantelis, Petros Petrou, Sophia Karagiorgou, Dimitrios Alexandrou
2021On the Evaluation of Sequential Machine Learning for Network Intrusion Detection.
Andrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese
2021Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence.
Yazid Merah, Tayeb Kenaza
2021Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments.
Andraz Krasovec, Gianmarco Baldini, Veljko Pejovic
2021Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls.
David Schatz, Michael Rossberg, Guenter Schaefer
2021PESTLE Analysis of Cybersecurity Education.
Sara Ricci, Vladimir Janout, Simon Parker, Jan Jerabek, Jan Hajny, Argyro Chatzopoulou, Remi Badonnel
2021POSNoise: An Effective Countermeasure Against Topic Biases in Authorship Analysis.
Oren Halvani, Lukas Graner
2021PUF-based Smart Tags for Supply Chain Management.
Alberto Falcone, Carmelo Felicetti, Alfredo Garro, Antonino Rullo, Domenico Saccà
2021Pan-European Cybersecurity Incidents Information Sharing Platform to support NIS Directive.
Dimitrios Skias, Sofia Tsekeridou, Theodore B. Zahariadis, Artemis C. Voulkidis, Terpsichori Helen Velivassaki, Konstantina Fotiadou
2021Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms.
Marcos Cavalcanti, Pedro R. M. Inácio, Mário M. Freire
2021Practitioners' Views on Cybersecurity Control Adoption and Effectiveness.
Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese
2021Privacy in Times of COVID-19: A Pilot Study in the Republic of Ireland.
Guodong Xie, Pintu Lohar, Claudia Florea, Malika Bendechache, Ramona Trestian, Rob Brennan, Regina Connolly, Irina Tal
2021Privacy-Preserving Online Parking Based on Smart Contracts.
Petr Dzurenda, Carles Angles-Tafalla, Sara Ricci, Lukas Malina
2021Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges.
Tiago Espinha Gasiba, Andrei-Cristian Iosif, Ulrike Lechner, Maria Pinto-Albuquerque
2021RansomClave: Ransomware Key Management using SGX.
Alpesh Bhudia, Daniel O'Keeffe, Daniele Sgandurra, Darren Hurley-Smith
2021RapidVMI: Fast and multi-core aware active virtual machine introspection.
Thomas Dangl, Benjamin Taubmann, Hans P. Reiser
2021Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications.
Franz Kuntke, Marcel Sinn, Christian Reuter
2021Remote Attestation Extended to the Analog Domain.
Lukas Jäger, Dominik Lorych
2021Risk-Oriented Design Approach For Forensic-Ready Software Systems.
Lukas Daubner, Raimundas Matulevicius
2021Risks and Opportunities for Information Hiding in DICOM Standard.
Aleksandra Mileva, Luca Caviglione, Aleksandar Velinov, Steffen Wendzel, Vesna Dimitrova
2021SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks.
Charilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, Qiang Ni, Charalambos Klitis, George Guirgis, Ana R. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, Konstantinos Votis, George Amponis, Wissam Mallouli
2021SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories.
Joachim Fabini, Alexander Hartl, Fares Meghdouri, Claudia Breitenfellner, Tanja Zseby
2021Secret Sharing-based Authenticated Key Agreement Protocol.
Petr Dzurenda, Sara Ricci, Raúl Casanova Marques, Jan Hajny, Petr Cika
2021Secure Decision Forest Evaluation.
Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval
2021Secure Open Fronthaul Interface for 5G Networks.
Joo Yeon Cho, Andrew Sergeev
2021Secure exchange of cyber threat intelligence using TAXII and distributed ledger technologies - application for electrical power and energy system.
Maryam Pahlevan, Artemis C. Voulkidis, Terpsichori Helen Velivassaki
2021Self-Determined Reciprocal Recommender Systemwith Strong Privacy Guarantees.
Saskia Nuñez von Voigt, Erik Daniel, Florian Tschorsch
2021Single-Use Delegatable Signatures Based on Smart Contracts.
Stephan Krenn, Thomas Lorünser
2021Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet.
Max Maaß, Marc-Pascal Clement, Matthias Hollick
2021SoK: Automatic Deobfuscation of Virtualization-protected Applications.
Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, Edgar R. Weippl
2021SoK: Money Laundering in Cryptocurrencies.
Kartick Kolachala, Ecem Simsek, Mohammed Ababneh, Roopa Vishwanathan
2021SoK: Remote Power Analysis.
Macarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley
2021Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview.
Tim Bender, Rolf Huesmann, Andreas Heinemann
2021Solving the cold start problem in Trust Management in IoT.
Michail Bampatsikos, Ilias Politis, Christos Xenakis, Stelios C. A. Thomopoulos
2021SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications.
Rosangela Casolare, Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone
2021Strong Anonymity is not Enough: Introducing Fault Tolerance to Planet-Scale Anonymous Communication Systems.
Lennart Oldenburg, Florian Tschorsch
2021Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises.
Bernd Remmele, Jessica Peichl
2021Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels.
Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk
2021Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures.
Alexander Hartl, Joachim Fabini, Christoph Roschger, Peter Eder-Neuhauser, Marco Petrovic, Roman Tobler, Tanja Zseby
2021System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling.
Martin Husák, Martin Lastovicka, Daniel Tovarnák
2021TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant and Mutually Authenticated TLS for IoT Environments.
Sebastian Paul, Felix Schick, Jan Seedorf
2021Template Protected Authentication based on Location History and b-Bit MinHash.
Masakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura, Rie Shigetomi Yamaguchi
2021The Matter of Cybersecurity Expert Workforce Scarcity in the Czech Republic and Its Alleviation Through the Proposed Qualifications Framework.
Jakub Drmola, Frantisek Kasl, Pavel Loutocký, Miroslav Mares, Tomás Pitner, Jakub Vostoupal
2021The Stress as Adversarial Factor for Cyber Decision Making.
David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Juan M. Estévez-Tapiador
2021The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations.
Kitty Kioskli, Theo Fotis, Haralambos Mouratidis
2021Time for Truth: Forensic Analysis of NTFS Timestamps.
Michael Galhuber, Robert Luh
2021Towards Improving Identity and Access Management with the IdMSecMan Process Framework.
Daniela Pöhn, Sebastian Seeber, Tanja Hanauer, Jule Anna Ziegler, David Schmitz
2021Towards Interoperable Vaccination Certificate Services.
Andreea Ancuta Corici, Tina Hühnlein, Detlef Hühnlein, Olaf Rode
2021Towards Secure Evaluation of Online Functionalities.
Andreas Klinger, Ulrike Meyer
2021Towards a standardized model for privacy-preserving Verifiable Credentials.
Jesús García Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio F. Skarmeta
2021Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark - Usefulness, Barriers, and Recommendations.
Mads Schaarup Andersen
2021Two Truths and a Lie: Exploring Soft Moderation of COVID-19 Misinformation with Amazon Alexa.
Filipo Sharevski, Donald Gover
2021Understanding the Ethical and Regulatory boundaries of the Military Actuation on the Cyberspace.
Pedro Ramon y Cajal Ramo, Jorge Maestre Vidal
2021Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets.
Antoine Boutet, Sonia Ben Mokhtar
2021Unsupervised Ethical Equity Evaluation of Adversarial Federated Networks.
Ilias Siniosoglou, Vasileios Argyriou, Stamatia Bibi, Thomas Lagkas, Panagiotis G. Sarigiannidis
2021User action representation and automated reasoning for the forensic analysis of mobile devices.
Cosimo Anglano, Massimo Canonico, Laura Giordano, Marco Guazzone, Daniele Theseider Dupré
2021Userspace Software Integrity Measurement.
Michael Eckel, Tim Riemann
2021V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems.
Thomas Rosenstatter, Tomas Olovsson, Magnus Almgren
2021VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps.
Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito
2021Virtual Knowledge Graphs for Federated Log Analysis.
Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling, Dietmar Winkler, Gerald Quirchmayr, A Min Tjoa
2021Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput.
Steven Engler, Ian Goldberg
2021What should we pay attention to when classifying violent videos?
Marcos Vinícius Adão Teixeira, Sandra Avila
2021Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems.
Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos
2021bccstego: A Framework for Investigating Network Covert Channels.
Matteo Repetto, Luca Caviglione, Marco Zuppelli
2021exHide: Hiding Data within the exFAT File System.
Julian Heeger, York Yannikos, Martin Steinebach
2021pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels.
Marco Zuppelli, Luca Caviglione