| 2021 | 5Greplay: a 5G Network Traffic Fuzzer - Application to Attack Injection. Zujany Salazar, Huu Nghia Nguyen, Wissam Mallouli, Ana R. Cavalli, Edgardo Montes de Oca |
| 2021 | A Bayesian Rule Learning Based Intrusion Detection System for the MQTT Communication Protocol. Qi Liu, Hubert B. Keller, Veit Hagenmeyer |
| 2021 | A Comparison of Natural Language Processing and Machine Learning Methods for Phishing Email Detection. Panagiotis Bountakas, Konstantinos Koutroumpouchos, Christos Xenakis |
| 2021 | A Formal Analysis of EnOcean's Teach-in and Authentication. Katharina Hofer-Schmitz |
| 2021 | A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports. Tore Kasper Frederiksen |
| 2021 | A Hybrid CNN-LSTM Based Approach for Anomaly Detection Systems in SDNs. Mahmoud Abdallah, Nhien-An Le-Khac, Hamed Z. Jahromi, Anca Delia Jurcut |
| 2021 | A Machine Learning Driven Threat Intelligence System for Malicious URL Detection. Rupa Chiramdasu, Gautam Srivastava, Sweta Bhattacharya, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu |
| 2021 | A Medium-Interaction Emulation and Monitoring System for Operational Technology. Stefano Bistarelli, Emanuele Bosimini, Francesco Santini |
| 2021 | A Real-Time Deep Learning Approach for Real-World Video Anomaly Detection. Stefano Petrocchi, Giacomo Giorgi, Mario G. C. A. Cimino |
| 2021 | A Recommender System for Tracking Vulnerabilities. Philip Dale Huff, Kylie McClanahan, Thao Le, Qinghua Li |
| 2021 | A Revised Taxonomy of Steganography Embedding Patterns. Steffen Wendzel, Luca Caviglione, Wojciech Mazurczyk, Aleksandra Mileva, Jana Dittmann, Christian Krätzer, Kevin Lamshöft, Claus Vielhauer, Laura Hartmann, Jörg Keller, Tom Neubert |
| 2021 | A Semi-Automated HTTP Traffic Analysis for Online Payments for Empowering Security, Forensics and Privacy Analysis. Salatiel Ezennaya-Gomez, Stefan Kiltz, Christian Kraetzer, Jana Dittmann |
| 2021 | A Serious Game Design Framework for Software Developers to Put GDPR into Practice. Abdulrahman Alhazmi, Nalin A. G. Arachchilage |
| 2021 | A Systematic Analysis of Covert Channels in the Network Time Protocol. Jonas Hielscher, Kevin Lamshöft, Christian Krätzer, Jana Dittmann |
| 2021 | A Threat Model Analysis of a Mobile Agent-based system on Raspberry Pi. Iván García Aguilar, Antonio Muñoz Gallego |
| 2021 | A Threat-Based Cybersecurity Risk Assessment Approach Addressing SME Needs. Max van Haastrecht, Injy Sarhan, Alireza Shojaifar, Louis Baumgartner, Wissam Mallouli, Marco Spruit |
| 2021 | A clustering approach to anonymize locations during dataset de-identification. Jenno Verdonck, Kevin De Boeck, Michiel Willocx, Jorn Lapon, Vincent Naessens |
| 2021 | A web tool for analyzing FIDO2/WebAuthn Requests and Responses. Athanasios Vasileios Grammatopoulos, Ilias Politis, Christos Xenakis |
| 2021 | ABEBox: A data driven access control for securing public cloud storage with efficient key revocation. Emanuele Raso, Lorenzo Bracciale, Pierpaolo Loreti, Giuseppe Bianchi |
| 2021 | AISGA: Multi-objective parameters optimization for countermeasures selection through genetic algorithm. Pantaleone Nespoli, Félix Gómez Mármol, Georgios Kambourakis |
| 2021 | ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17-20, 2021 Delphine Reinhardt, Tilo Müller |
| 2021 | Accurate and Robust Malware Analysis through Similarity of External Calls Dependency Graphs (ECDG). Cassius Puodzius, Olivier Zendra, Annelie Heuser, Lamine Noureddine |
| 2021 | Adaptive Mitigation of Tactical Denial of Sustainability. Marco Antonio Sotelo Monge, Jorge Maestre Vidal, Roumen Daton Medenou Choumanof |
| 2021 | Adversarial Examples Against a BERT ABSA Model - Fooling Bert With L33T, Misspellign, and Punctuation, . Nora Hofer, Pascal Schöttle, Alexander Rietzler, Sebastian Stabinger |
| 2021 | An Agnostic Domain Specific Language for Implementing Attacks in an Automotive Use Case. Christian Wolschke, Stefan Marksteiner, Tobias Braun, Markus Wolf |
| 2021 | An Indicators-of-Risk Library for Industrial Network Security. Carolina Adaros Boye, Paul Kearney, Mark B. Josephs, Hans Ulmer |
| 2021 | An exploratory analysis on the impact of Shodan scanning tool on the network attacks. Andrea Tundis, Eric Marc Modo Nga, Max Mühlhäuser |
| 2021 | Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods. Daniel Zelle, Timm Lauser, Dustin Kern, Christoph Krauß |
| 2021 | Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems. Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos |
| 2021 | Artificial Steganographic Network Data Generation Concept and Evaluation of Detection Approaches to secure Industrial Control Systems against Steganographic Attacks. Tom Neubert, Claus Vielhauer, Christian Kraetzer |
| 2021 | Best Practices for Notification Studiesfor Security and Privacy Issues on the Internet. Max Maaß, Henning Pridöhl, Dominik Herrmann, Matthias Hollick |
| 2021 | Bloom Filter based Collective Remote Attestation for Dynamic Networks. Salvatore Frontera, Riccardo Lazzeretti |
| 2021 | Building Open Source Cyber Range To Teach Cyber Security. Tomás Lieskovan, Jan Hajny |
| 2021 | Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges. Jörg Keller |
| 2021 | Cholesteric Spherical Reflectors as Physical Unclonable Identifiers in Anti-counterfeiting. Mónica P. Arenas, Hüseyin Demirci, Gabriele Lenzini |
| 2021 | Classifying SMEs for Approaching Cybersecurity Competence and Awareness. Alireza Shojaifar, Heini Järvinen |
| 2021 | Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection. Bram van Dooremaal, Pavlo Burda, Luca Allodi, Nicola Zannone |
| 2021 | Continuous User Authentication for Human-Robot Collaboration. Shurook S. Almohamade, John A. Clark, James Law |
| 2021 | Control Effectiveness: a Capture-the-Flag Study. Arnau Erola, Louise Axon, Alastair Janse van Rensburg, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese |
| 2021 | Crème de la Crème: Lessons from Papers in Security Publications. Simon Vrhovec, Luca Caviglione, Steffen Wendzel |
| 2021 | Cybersecurity Curricula Designer. Jan Hajny, Sara Ricci, Edmundas Piesarskas, Marek Sikora |
| 2021 | DISSIMILAR: Towards fake news detection using information hiding, signal processing and machine learning. David Megías, Minoru Kuribayashi, Andrea Rosales, Wojciech Mazurczyk |
| 2021 | Data Hiding Using Code Obfuscation. Pawel Rajba, Wojciech Mazurczyk |
| 2021 | DeCanSec: A Decentralized Architecture for Secure Statistical Computations on Distributed Health Registry Data. Narasimha Raghavan Veeraragavan, Jan Franz Nygård |
| 2021 | Detection of Brute-Force Attacks in End-to-End Encrypted Network Traffic. Pascal Wichmann, Matthias Marx, Hannes Federrath, Mathias Fischer |
| 2021 | Detection of VSI-DDoS Attacks on the Edge: A Sequential Modeling Approach. Javad Forough, Monowar Bhuyan, Erik Elmroth |
| 2021 | Determining the Robustness of Privacy Enhancing DeID Against the ReID Adversary: An Experimental Study. Ankur Chattopadhyay, Robert Ruska Jr., Levi Pfantz |
| 2021 | Discovery of Single-Vendor Marketplace Operators in the Tor-Network. Fabian Brenner, Florian Platzer, Martin Steinebach |
| 2021 | Do Security Reports Meet Usability?: Lessons Learned from Using Actionable Mitigations for Patching TLS Misconfigurations. Salvatore Manfredi, Mariano Ceccato, Giada Sciarretta, Silvio Ranise |
| 2021 | DoS Attacks in Available MQTT Implementations: Investigating the Impact on Brokers and Devices, and supported Anti-DoS Protections. Umberto Morelli, Ivan Vaccari, Silvio Ranise, Enrico Cambiaso |
| 2021 | Efficient Error Prediction for Differentially Private Algorithms. Boel Nelson |
| 2021 | Enabling Privacy-Preserving Rule Mining in Decentralized Social Networks. Aidmar Wainakh, Aleksej Strassheim, Tim Grube, Jörg Daubert, Max Mühlhäuser |
| 2021 | Evaluating the Data Inconsistency of Open-Source Vulnerability Repositories. Yuning Jiang, Manfred A. Jeusfeld, Jianguo Ding |
| 2021 | Examining the Link Between Stress Level and Cybersecurity Practices of Hospital Staff in Indonesia. Muhammad Ali Fauzi, Prosper Kandabongee Yeng, Bian Yang, Dita Rachmayani |
| 2021 | FADE: Detecting Fake News Articles on the Web. Bahruz Jabiyev, Sinan Pehlivanoglu, Kaan Onarlioglu, Engin Kirda |
| 2021 | Fighting organized crime by automatically detecting money laundering-related financial transactions. Andrea Tundis, Soujanya Nemalikanti, Max Mühlhäuser |
| 2021 | Finding Phish in a Haystack: A Pipeline for Phishing Classification on Certificate Transparency Logs. Arthur Drichel, Vincent Drury, Justus von Brandt, Ulrike Meyer |
| 2021 | First Step Towards EXPLAINable DGA Multiclass Classification. Arthur Drichel, Nils Faerber, Ulrike Meyer |
| 2021 | Forensic Artifact Finder (ForensicAF): An Approach & Tool for Leveraging Crowd-Sourced Curated Forensic Artifacts. Tyler Balon, Krikor Herlopian, Ibrahim M. Baggili, Cinthya Grajeda-Mendez |
| 2021 | Forensicast: A Non-intrusive Approach & Tool For Logical Forensic Acquisition & Analysis of The Google Chromecast TV. Alex Sitterer, Nicholas Dubois, Ibrahim M. Baggili |
| 2021 | Formal Validation of Credibility and Accuracy Assessment of Safety Messages in VANETs. Ons Chikhaoui, Aida Ben Chehida Douss, Ryma Abassi, Sihem Guemara El Fatmi |
| 2021 | Formal Validation of a Security Mechanism against the RSU Compromise Attack. Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss, Sihem Guemara El Fatmi |
| 2021 | From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms. Clemens Sauerwein, Daniel Fischer, Milena Rubsamen, Guido Rosenberger, Dirk Stelzer, Ruth Breu |
| 2021 | GEIGER: Solution for small businesses to protect themselves against cyber-threats. José Javier de Vicente Mohino, Wissam Mallouli, José Francisco Ruiz, Max van Haastrecht |
| 2021 | Grand Theft App: Digital Forensics of Vehicle Assistant Apps. Simon Ebbers, Fabian Ising, Christoph Saatjohann, Sebastian Schinzel |
| 2021 | Hardware-In-The-Loop Labs for SCADA Cybersecurity Awareness and Training. Maxime Puys, Pierre-Henri Thevenon, Stéphane Mocanu |
| 2021 | How Lightning's Routing Diminishes its Anonymity. Satwik Prabhu Kumble, Dick H. J. Epema, Stefanie Roos |
| 2021 | How Private is Android's Private DNS Setting? Identifying Apps by Encrypted DNS Traffic. Michael Mühlhauser, Henning Pridöhl, Dominik Herrmann |
| 2021 | Hunting Shadows: Towards Packet Runtime-based Detection Of Computational Intensive Reversible Covert Channels. Tobias Schmidbauer, Steffen Wendzel |
| 2021 | I Told You Tomorrow: Practical Time-Locked Secrets using Smart Contracts. Enrico Bacis, Dario Facchinetti, Marco Guarnieri, Marco Rosa, Matthew Rossi, Stefano Paraboschi |
| 2021 | Implementing CRYSTALS-Dilithium Signature Scheme on FPGAs. Sara Ricci, Lukas Malina, Petr Jedlicka, David Smékal, Jan Hajny, Peter Cíbik, Petr Dzurenda, Patrik Dobias |
| 2021 | In-vehicle detection of targeted CAN bus attacks. Florian Fenzl, Roland Rieke, Andreas Dominik |
| 2021 | Information Security Analysis in the Passenger-Autonomous Vehicle Interaction. Mariia Bakhtina, Raimundas Matulevicius |
| 2021 | Information Security Assessment and Certification within Supply Chains. Henrique Santos, André Oliveira, Lúcia Soares, Alan Satis, Alexandre J. T. Santos |
| 2021 | Integer Overflow Detection with Delayed Runtime Test. Zhen Huang, Xiaowei Yu |
| 2021 | Integrating Security Behavior into Attack Simulations. Simon Hacks, Ismail Butun, Robert Lagerström, Andrei Buhaiu, Anna Georgiadou, Ariadni Michalitsi-Psarrou |
| 2021 | Irish Attitudes Toward COVID Tracker App & Privacy: Sentiment Analysis on Twitter and Survey Data. Pintu Lohar, Guodong Xie, Malika Bendechache, Rob Brennan, Edoardo Celeste, Ramona Trestian, Irina Tal |
| 2021 | JPEG File Fragmentation Point Detection using Huffman Code and Quantization Array Validation. Vincent van der Meer, Jeroen van den Bos |
| 2021 | Linking CVE's to MITRE ATT&CK Techniques. Aditya Kuppa, Lamine M. Aouad, Nhien-An Le-Khac |
| 2021 | Listen to Your Heart: Evaluation of the Cardiologic Ecosystem. Endres Puschner, Christoph Saatjohann, Markus Willing, Christian Dresen, Julia Köbe, Benjamin Rath, Christof Paar, Lars Eckardt, Uwe Haverkamp, Sebastian Schinzel |
| 2021 | Location Security under Reference Signals' Spoofing Attacks: Threat Model and Bounds. Stefania Bartoletti, Giuseppe Bianchi, Danilo Orlando, Ivan Palamà, Nicola Blefari-Melazzi |
| 2021 | Log Abstraction for Information Security: Heuristics and Reproducibility. Rafael Copstein, Jeff Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood |
| 2021 | MESH: A Memory-Efficient Safe Heap for C/C++. Emanuel Q. Vintila, Philipp Zieris, Julian Horsch |
| 2021 | MI-LXC: A Small-Scale Internet-Like Environment for Network Security Teaching. François Lesueur, Camille Noûs |
| 2021 | Madrid Quantum Network: A First Step to Quantum Internet. Marta Irene García Cid, Laura Ortiz Martín, Vicente Martín Ayuso |
| 2021 | Managing Anonymous Keys in a Fog-Computing Platform. Raphael Schermann, Ronald Toegl |
| 2021 | Message-of-the-Day (MOTD) Banner Language Variations as an Adaptive Honeypot Deterrent of Unauthorized Access. Filipo Sharevski, Samuel Jevitz |
| 2021 | Modeling of Personalized Privacy Disclosure Behavior: A Formal Method Approach. A. K. M. Nuhil Mehdy, Hoda Mehrpouyan |
| 2021 | Multi-View Learning for Repackaged Malware Detection. Shirish Kumar Singh, Kushagra Chaturvedy, Bharavi Mishra |
| 2021 | Nautilus: A Tool For Automated Deployment And Sharing Of Cyber Range Scenarios. Giorgio Bernardinetti, Stefano Iafrate, Giuseppe Bianchi |
| 2021 | Network Flow Entropy for Identifying Malicious Behaviours in DNS Tunnels. Yulduz Khodjaeva, Nur Zincir-Heywood |
| 2021 | Network Intrusion Detection in the Wild - the Orange use case in the SIMARGL project. Mikolaj Komisarek, Marek Pawlicki, Mikolaj Kowalski, Adrian Marzecki, Rafal Kozik, Michal Choras |
| 2021 | Nori: Concealing the Concealed Identifier in 5G. John Preuß Mattsson, Prajwol Kumar Nakarmi |
| 2021 | OVANA: An Approach to Analyze and Improve the Information Quality of Vulnerability Databases. Philipp Kuehn, Markus Bayer, Marc Wendelborn, Christian Reuter |
| 2021 | Obstacles and Challenges in Transforming Applications for Distributed Data Ledger Integration. Martin Pirker, Ernst Piller |
| 2021 | On Strengthening SMEs and MEs Threat Intelligence and Awareness by Identifying Data Breaches, Stolen Credentials and Illegal Activities on the Dark Web. George Pantelis, Petros Petrou, Sophia Karagiorgou, Dimitrios Alexandrou |
| 2021 | On the Evaluation of Sequential Machine Learning for Network Intrusion Detection. Andrea Corsini, Shanchieh Jay Yang, Giovanni Apruzzese |
| 2021 | Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence. Yazid Merah, Tayeb Kenaza |
| 2021 | Opposing Data Exploitation: Behaviour Biometrics for Privacy-Preserving Authentication in IoT Environments. Andraz Krasovec, Gianmarco Baldini, Veljko Pejovic |
| 2021 | Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls. David Schatz, Michael Rossberg, Guenter Schaefer |
| 2021 | PESTLE Analysis of Cybersecurity Education. Sara Ricci, Vladimir Janout, Simon Parker, Jan Jerabek, Jan Hajny, Argyro Chatzopoulou, Remi Badonnel |
| 2021 | POSNoise: An Effective Countermeasure Against Topic Biases in Authorship Analysis. Oren Halvani, Lukas Graner |
| 2021 | PUF-based Smart Tags for Supply Chain Management. Alberto Falcone, Carmelo Felicetti, Alfredo Garro, Antonino Rullo, Domenico Saccà |
| 2021 | Pan-European Cybersecurity Incidents Information Sharing Platform to support NIS Directive. Dimitrios Skias, Sofia Tsekeridou, Theodore B. Zahariadis, Artemis C. Voulkidis, Terpsichori Helen Velivassaki, Konstantina Fotiadou |
| 2021 | Performance Evaluation of Container-Level Anomaly-Based Intrusion Detection Systems for Multi-Tenant Applications Using Machine Learning Algorithms. Marcos Cavalcanti, Pedro R. M. Inácio, Mário M. Freire |
| 2021 | Practitioners' Views on Cybersecurity Control Adoption and Effectiveness. Louise Axon, Arnau Erola, Alastair Janse van Rensburg, Jason R. C. Nurse, Michael Goldsmith, Sadie Creese |
| 2021 | Privacy in Times of COVID-19: A Pilot Study in the Republic of Ireland. Guodong Xie, Pintu Lohar, Claudia Florea, Malika Bendechache, Ramona Trestian, Rob Brennan, Regina Connolly, Irina Tal |
| 2021 | Privacy-Preserving Online Parking Based on Smart Contracts. Petr Dzurenda, Carles Angles-Tafalla, Sara Ricci, Lukas Malina |
| 2021 | Raising Security Awareness of Cloud Deployments using Infrastructure as Code through CyberSecurity Challenges. Tiago Espinha Gasiba, Andrei-Cristian Iosif, Ulrike Lechner, Maria Pinto-Albuquerque |
| 2021 | RansomClave: Ransomware Key Management using SGX. Alpesh Bhudia, Daniel O'Keeffe, Daniele Sgandurra, Darren Hurley-Smith |
| 2021 | RapidVMI: Fast and multi-core aware active virtual machine introspection. Thomas Dangl, Benjamin Taubmann, Hans P. Reiser |
| 2021 | Reliable Data Transmission using Low Power Wide Area Networks (LPWAN) for Agricultural Applications. Franz Kuntke, Marcel Sinn, Christian Reuter |
| 2021 | Remote Attestation Extended to the Analog Domain. Lukas Jäger, Dominik Lorych |
| 2021 | Risk-Oriented Design Approach For Forensic-Ready Software Systems. Lukas Daubner, Raimundas Matulevicius |
| 2021 | Risks and Opportunities for Information Hiding in DICOM Standard. Aleksandra Mileva, Luca Caviglione, Aleksandar Velinov, Steffen Wendzel, Vesna Dimitrova |
| 2021 | SANCUS: Multi-layers Vulnerability Management Framework for Cloud-native 5G networks. Charilaos C. Zarakovitis, Dimitrios Klonidis, Zujany Salazar, Anna Prudnikova, Arash Bozorgchenani, Qiang Ni, Charalambos Klitis, George Guirgis, Ana R. Cavalli, Nicholas Sgouros, Eftychia Makri, Antonios Lalas, Konstantinos Votis, George Amponis, Wissam Mallouli |
| 2021 | SecTULab: A Moodle-Integrated Secure Remote Access Architecture for Cyber Security Laboratories. Joachim Fabini, Alexander Hartl, Fares Meghdouri, Claudia Breitenfellner, Tanja Zseby |
| 2021 | Secret Sharing-based Authenticated Key Agreement Protocol. Petr Dzurenda, Sara Ricci, Raúl Casanova Marques, Jan Hajny, Petr Cika |
| 2021 | Secure Decision Forest Evaluation. Slim Bettaieb, Loïc Bidoux, Olivier Blazy, Baptiste Cottier, David Pointcheval |
| 2021 | Secure Open Fronthaul Interface for 5G Networks. Joo Yeon Cho, Andrew Sergeev |
| 2021 | Secure exchange of cyber threat intelligence using TAXII and distributed ledger technologies - application for electrical power and energy system. Maryam Pahlevan, Artemis C. Voulkidis, Terpsichori Helen Velivassaki |
| 2021 | Self-Determined Reciprocal Recommender Systemwith Strong Privacy Guarantees. Saskia Nuñez von Voigt, Erik Daniel, Florian Tschorsch |
| 2021 | Single-Use Delegatable Signatures Based on Smart Contracts. Stephan Krenn, Thomas Lorünser |
| 2021 | Snail Mail Beats Email Any Day: On Effective Operator Security Notifications in the Internet. Max Maaß, Marc-Pascal Clement, Matthias Hollick |
| 2021 | SoK: Automatic Deobfuscation of Virtualization-protected Applications. Patrick Kochberger, Sebastian Schrittwieser, Stefan Schweighofer, Peter Kieseberg, Edgar R. Weippl |
| 2021 | SoK: Money Laundering in Cryptocurrencies. Kartick Kolachala, Ecem Simsek, Mohammed Ababneh, Roopa Vishwanathan |
| 2021 | SoK: Remote Power Analysis. Macarena C. Martínez-Rodríguez, Ignacio M. Delgado-Lozano, Billy Bob Brumley |
| 2021 | Software Development Processes for ADs, SMCs and OSCs supporting Usability, Security, and Privacy Goals - an Overview. Tim Bender, Rolf Huesmann, Andreas Heinemann |
| 2021 | Solving the cold start problem in Trust Management in IoT. Michail Bampatsikos, Ilias Politis, Christos Xenakis, Stelios C. A. Thomopoulos |
| 2021 | SteælErgon: A Framework for Injecting Colluding Malicious Payload in Android Applications. Rosangela Casolare, Giovanni Ciaramella, Fabio Martinelli, Francesco Mercaldo, Antonella Santone |
| 2021 | Strong Anonymity is not Enough: Introducing Fault Tolerance to Planet-Scale Anonymous Communication Systems. Lennart Oldenburg, Florian Tschorsch |
| 2021 | Structuring a Cybersecurity Curriculum for Non-IT Employees of Micro- and Small Enterprises. Bernd Remmele, Jessica Peichl |
| 2021 | Study of the Error Detection and Correction Scheme for Distributed Network Covert Channels. Piotr Nowakowski, Piotr Zórawski, Krzysztof Cabaj, Wojciech Mazurczyk |
| 2021 | Subverting Counter Mode Encryption for Hidden Communication in High-Security Infrastructures. Alexander Hartl, Joachim Fabini, Christoph Roschger, Peter Eder-Neuhauser, Marco Petrovic, Roman Tobler, Tanja Zseby |
| 2021 | System for Continuous Collection of Contextual Information for Network Security Management and Incident Handling. Martin Husák, Martin Lastovicka, Daniel Tovarnák |
| 2021 | TPM-Based Post-Quantum Cryptography: A Case Study on Quantum-Resistant and Mutually Authenticated TLS for IoT Environments. Sebastian Paul, Felix Schick, Jan Seedorf |
| 2021 | Template Protected Authentication based on Location History and b-Bit MinHash. Masakazu Fujio, Kenta Takahashi, Yosuke Kaga, Wataru Nakamura, Yoshiko Yasumura, Rie Shigetomi Yamaguchi |
| 2021 | The Matter of Cybersecurity Expert Workforce Scarcity in the Czech Republic and Its Alleviation Through the Proposed Qualifications Framework. Jakub Drmola, Frantisek Kasl, Pavel Loutocký, Miroslav Mares, Tomás Pitner, Jakub Vostoupal |
| 2021 | The Stress as Adversarial Factor for Cyber Decision Making. David Sandoval Rodríguez-Bermejo, Jorge Maestre Vidal, Juan M. Estévez-Tapiador |
| 2021 | The landscape of cybersecurity vulnerabilities and challenges in healthcare: Security standards and paradigm shift recommendations. Kitty Kioskli, Theo Fotis, Haralambos Mouratidis |
| 2021 | Time for Truth: Forensic Analysis of NTFS Timestamps. Michael Galhuber, Robert Luh |
| 2021 | Towards Improving Identity and Access Management with the IdMSecMan Process Framework. Daniela Pöhn, Sebastian Seeber, Tanja Hanauer, Jule Anna Ziegler, David Schmitz |
| 2021 | Towards Interoperable Vaccination Certificate Services. Andreea Ancuta Corici, Tina Hühnlein, Detlef Hühnlein, Olaf Rode |
| 2021 | Towards Secure Evaluation of Online Functionalities. Andreas Klinger, Ulrike Meyer |
| 2021 | Towards a standardized model for privacy-preserving Verifiable Credentials. Jesús García Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio F. Skarmeta |
| 2021 | Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark - Usefulness, Barriers, and Recommendations. Mads Schaarup Andersen |
| 2021 | Two Truths and a Lie: Exploring Soft Moderation of COVID-19 Misinformation with Amazon Alexa. Filipo Sharevski, Donald Gover |
| 2021 | Understanding the Ethical and Regulatory boundaries of the Military Actuation on the Cyberspace. Pedro Ramon y Cajal Ramo, Jorge Maestre Vidal |
| 2021 | Uniqueness Assessment of Human Mobility on Multi-Sensor Datasets. Antoine Boutet, Sonia Ben Mokhtar |
| 2021 | Unsupervised Ethical Equity Evaluation of Adversarial Federated Networks. Ilias Siniosoglou, Vasileios Argyriou, Stamatia Bibi, Thomas Lagkas, Panagiotis G. Sarigiannidis |
| 2021 | User action representation and automated reasoning for the forensic analysis of mobile devices. Cosimo Anglano, Massimo Canonico, Laura Giordano, Marco Guazzone, Daniele Theseider Dupré |
| 2021 | Userspace Software Integrity Measurement. Michael Eckel, Tim Riemann |
| 2021 | V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems. Thomas Rosenstatter, Tomas Olovsson, Magnus Almgren |
| 2021 | VTDroid: Value-based Tracking for Overcoming Anti-Taint-Analysis Techniques in Android Apps. Hiroki Inayoshi, Shohei Kakei, Eiji Takimoto, Koichi Mouri, Shoichi Saito |
| 2021 | Virtual Knowledge Graphs for Federated Log Analysis. Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling, Dietmar Winkler, Gerald Quirchmayr, A Min Tjoa |
| 2021 | Weaving a Faster Tor: A Multi-Threaded Relay Architecture for Improved Throughput. Steven Engler, Ian Goldberg |
| 2021 | What should we pay attention to when classifying violent videos? Marcos Vinícius Adão Teixeira, Sandra Avila |
| 2021 | Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems. Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos |
| 2021 | bccstego: A Framework for Investigating Network Covert Channels. Matteo Repetto, Luca Caviglione, Marco Zuppelli |
| 2021 | exHide: Hiding Data within the exFAT File System. Julian Heeger, York Yannikos, Martin Steinebach |
| 2021 | pcapStego: A Tool for Generating Traffic Traces for Experimenting with Network Covert Channels. Marco Zuppelli, Luca Caviglione |