| 2022 | A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy Systems. Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis |
| 2022 | A Critique of EU Digital COVID-19 Certificates: Do Vaccine Passports Endanger Privacy? Harry Halpin |
| 2022 | A Methodology for enhancing Emergency Situational Awareness through Social Media. Antonios Karteris, Georgios Tzanos, Lazaros Papadopoulos, Konstantinos P. Demestichas, Dimitrios Soudris, Juliette Pauline Philibert, Carlos López Gómez |
| 2022 | A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale. Joseph Khoury, Morteza Safaei Pour, Elias Bou-Harb |
| 2022 | A Quantitative Analysis of Offensive Cyber Operation (OCO) Automation Tools. Samuel Zurowski, George Lord, Ibrahim M. Baggili |
| 2022 | A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners. Emma Lavens, Pieter Philippaerts, Wouter Joosen |
| 2022 | A Resilient Network Node for the Industrial Internet of Things. Lukas Jäger, Dominik Lorych, Michael Eckel |
| 2022 | A Revisit of Attestable Nodes for Networked Applications. Mathias Schüpany, Martin Pirker |
| 2022 | A Synopsis of Critical Aspects for Darknet Research. Florian Platzer, Alexandra Lux |
| 2022 | A novel, refined dataset for real-time Network Intrusion Detection. Mikolaj Komisarek, Marek Pawlicki, Maria-Elena Mihailescu, Darius Mihai, Mihai Carabas, Rafal Kozik, Michal Choras |
| 2022 | ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022 |
| 2022 | Adding European Cybersecurity Skills Framework into Curricula Designer. Jan Hajny, Marek Sikora, Athanasios Vasileios Grammatopoulos, Fabio Di Franco |
| 2022 | All that is Solid Melts into Air: Towards Decentralized Cryptographic Access Control. Harry Halpin |
| 2022 | An Early Detection of Android Malware Using System Calls based Machine Learning Model. Xinrun Zhang, Akshay Mathur, Lei Zhao, Safia Rahmat, Quamar Niyaz, Ahmad Y. Javaid, Xiaoli Yang |
| 2022 | An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices. Takahiro Ueda, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto |
| 2022 | An Investigation of PSA Certified. SeongHan Shin, Tomoyuki Ogawa, Ryo Fujita, Mari Itoh, Hirotaka Yoshida |
| 2022 | Analysis and Evaluation of Hardware Trust Anchors in the Automotive Domain. Christian Plappert, Andreas Fuchs, Ronald Heddergott |
| 2022 | Analysis and prediction of web proxies misbehavior. Zahra Nezhadian, Enrico Branca, Natalia Stakhanova |
| 2022 | Analyzing Coverages of Cyber Insurance Policies Using Ontology. Markos Charalambous, Aristeidis Farao, George Kalatzantonakis, Panagiotis Kanakakis, Nikos Salamanos, Evangelos Kotsifakos, Evangellos Froudakis |
| 2022 | Analyzing RRC Replay Attack and Securing Base Station with Practical Method. Seongmin Park, Ilsun You, Hoonyong Park, Dowon Kim |
| 2022 | Android Permission Manager, Visual Cues, and their Effect on Privacy Awareness and Privacy Literacy. Vera Schmitt, Maija Poikela, Sebastian Möller |
| 2022 | Applying Machine Learning on RSRP-based Features for False Base Station Detection. Prajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah |
| 2022 | Applying a cryptographic metric to post-quantum lattice-based signature algorithms. Markus Rautell, Outi-Marja Latvala, Visa Antero Vallivaara, Kimmo Halunen |
| 2022 | Assessing discrepancies between network traffic and privacy policies of public sector web services. Timi Heino, Robin Carlsson, Sampsa Rauti, Ville Leppänen |
| 2022 | Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104. László Erdodi, Pallavi Kaliyar, Siv Hilde Houmb, Aida Akbarzadeh, André Jung Waltoft-Olsen |
| 2022 | Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs. Marwa Gadala, Lorenzo Strigini, Radek Fujdiak |
| 2022 | Automatic online quantification and prioritization of data protection risks. Sascha Sven Zmiewski, Jan Laufer, Zoltán Ádám Mann |
| 2022 | BISCUIT - Blockchain Security Incident Reporting based on Human Observations. Benedikt Putz, Manfred Vielberth, Günther Pernul |
| 2022 | Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding. Marta Catillo, Antonio Pecchia, Umberto Villano |
| 2022 | Bridging the Gap Between Certification and Software Development. Claudio A. Ardagna, Nicola Bena, Ramon Martín de Pozuelo |
| 2022 | Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication. Tobias Schmidbauer, Jörg Keller, Steffen Wendzel |
| 2022 | Classifying the factors affecting the adoption of the SDN-microSENSE innovations. Theodoros Rokkas, Ioannis Neokosmidis |
| 2022 | CloudFL: A Zero-Touch Federated Learning Framework for Privacy-aware Sensor Cloud. Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Afra Mashhadi |
| 2022 | Combining Variational Autoencoders and Transformer Language Models for Improved Password Generation. David Biesner, Kostadin Cvejoski, Rafet Sifa |
| 2022 | Compiler-Aided Development of Trusted Enclaves with Rust. Felix Dreissig, Jonas Röckl, Tilo Müller |
| 2022 | ConSenseIoT: A Consensus Algorithm for Secure and Scalable Blockchain in the IoT context. Harris Niavis, Konstantinos Loupos |
| 2022 | Cookie Disclaimers: Impact of Design and Users' Attitude. Benjamin Maximilian Berens, Heike Dietmann, Chiara Krisam, Oksana Kulyk, Melanie Volkamer |
| 2022 | CopypastaVulGuard - A browser extension to prevent copy and paste spreading of vulnerable source code in forum posts. Holger Schmidt, Max van Aerssen, Christian Leich, Abdulkader Benni, Salar Al Ali, Jakob Tanz |
| 2022 | Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations. Lukás Sadlek, Pavel Celeda, Daniel Tovarnák |
| 2022 | Cyber-Security Culture Assessment in Academia: A COVID-19 Study: Applying a Cyber-Security Culture Framework to assess the Academia's resilience and readiness. Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis |
| 2022 | Cyber-security measures for protecting EPES systems in the 5G area. Alexios Lekidis |
| 2022 | Data Acquisition on a Large Darknet Marketplace. York Yannikos, Julian Heeger, Martin Steinebach |
| 2022 | Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns. Vincent Drury, Luisa Lux, Ulrike Meyer |
| 2022 | Deep Reinforcement Learning-Based Defense Strategy Selection. Axel Charpentier, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich |
| 2022 | Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancements. Dimitrios Skias, Sofia Tsekeridou, Theodore B. Zahariadis, Artemis C. Voulkidis, Terpsichori Helen Velivassaki |
| 2022 | Design Space Exploration of DICE. Dominik Lorych, Lukas Jäger |
| 2022 | Detecting Unknown DGAs without Context Information. Arthur Drichel, Justus von Brandt, Ulrike Meyer |
| 2022 | Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit. Luca Caviglione, Martin Grabowski, Kai Gutberlet, Adrian Marzecki, Marco Zuppelli, Andreas Schaffhauser, Wojciech Mazurczyk |
| 2022 | DevSecOps In Embedded Systems: An Empirical Study Of Past Literature. Hasan Yasar, Sam E. Teplov |
| 2022 | Disruptive Quantum Safe Technologies. Marta Irene García Cid, Jorge Álvaro González, Laura Ortiz Martín, Diego Del Río Gómez |
| 2022 | Distance-based Techniques for Personal Microbiome Identification✱. Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart |
| 2022 | Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness. Tahir Ahmad, Umberto Morelli, Silvio Ranise |
| 2022 | Enhanced Anomaly Detection for Cyber-Attack Detection in Smart Water Distribution Systems. Branka Stojanovic, Helmut Neuschmied, Martin Winter, Ulrike Kleb |
| 2022 | Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks. Mohamed Amine Merzouk, Joséphine Delas, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich |
| 2022 | Evaluating The Cyber-Security Culture of the EPES Sector: Applying a Cyber-Security Culture Framework to assess the EPES Sector's resilience and readiness. Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis |
| 2022 | Explainability-based Debugging of Machine Learning for Vulnerability Discovery. Angelo Sotgiu, Maura Pintor, Battista Biggio |
| 2022 | FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks. Emilie Bout, Alessandro Brighente, Mauro Conti, Valeria Loscrì |
| 2022 | Fast and Blind Detection of Rate-Distortion-Preserving Video Watermarks. Hannes Mareen, Glenn Van Wallendael, Peter Lambert, Fouad Khelifi |
| 2022 | Fault-Tolerant SDN Solution for Cybersecurity Applications. Athanasios Liatifis, Christos Dalamagkas, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Evangelos Markakis, Valeri M. Mladenov, Panagiotis G. Sarigiannidis |
| 2022 | Federated learning based IDS approach for the IoV. Amal Hbaieb, Samiha Ayed, Lamia Chaari |
| 2022 | FileUploadChecker: Detecting and Sanitizing Malicious File Uploads in Web Applications at the Request Level. Pascal Wichmann, Alexander Groddeck, Hannes Federrath |
| 2022 | Forensic analysis of Tor in Windows environment: A case study. Vaia-Maria Angeli, Ahmad Atamli, Erisa Karafili |
| 2022 | Fraudulent Activities in the Cyber Realm: DEFRAUDify Project: Fraudulent Activities in the Cyber Realm: DEFRAUDify Project. Razvan-Alexandru Bratulescu, Robert-Ionut Vatasoiu, Sorina-Andreea Mitroi, George Suciu, Mari-Anais Sachian, Daniel-Marian Dutu, Serban-Emanuel Calescu |
| 2022 | GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments. Ioannis Kalderemidis, Aristeidis Farao, Panagiotis Bountakas, Sakshyam Panda, Christos Xenakis |
| 2022 | Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model. Evangelos Chaskos, Jason Diakoumakos, Nicholas Kolokotronis, George Lepouras |
| 2022 | Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing. Alessandro Brighente, Mauro Conti, Savio Sciancalepore |
| 2022 | HybridDAD: Detecting DDoS Flooding Attack using Machine Learning with Programmable Switches. Mostafa Roshani, Mehdi Nobakht |
| 2022 | Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing. Saurabh Deochake, Vrushali Channapattan |
| 2022 | Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion. Georgios Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras |
| 2022 | Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card. Raúl Casanova Marqués, Petr Dzurenda, Jan Hajny |
| 2022 | Improved Integer-wise Homomorphic Comparison and Division based on Polynomial Evaluation. Koki Morimura, Daisuke Maeda, Takashi Nishide |
| 2022 | Improving Network, Data and Application Security for SMEs. Christos Tselios, Ilias Politis, Christos Xenakis |
| 2022 | Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems. Tom Neubert, Antonio José Caballero Morcillo, Claus Vielhauer |
| 2022 | Improving Security and Scalability in Smart Grids using Blockchain Technologies. Mandana Falahi, Andrei Vasilateanu, Nicolae Goga, George Suciu, Mari-Anais Sachian, Robert Florescu, Stefan-Daniel Stanciu |
| 2022 | Introducing Quantum Computing in Mobile Malware Detection. Giovanni Ciaramella, Giacomo Iadarola, Francesco Mercaldo, Marco Storto, Antonella Santone, Fabio Martinelli |
| 2022 | Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation. Sara Ricci, Marek Sikora, Simon Parker, Imre Lendak, Yianna Danidou, Argyro Chatzopoulou, Remi Badonnel, Donatas Alksnys |
| 2022 | Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks. Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Heng Siong Lim, Qiang Ni, Antonios Gouglidis, Wissam Mallouli |
| 2022 | Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster. Clinton Cao, Agathe Blaise, Sicco Verwer, Filippo Rebecchi |
| 2022 | Lightweight Parsing and Slicing for Bug Identification in C. Luca Mecenero, Ranindya Paramitha, Ivan Pashchenko, Fabio Massacci |
| 2022 | Limitations of Web Cryptojacking Detection: A Practical Evaluation. Pawel Rajba, Wojciech Mazurczyk |
| 2022 | Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy. Samuel Sulan, Martin Husák |
| 2022 | MITRE ATT&CK-driven Cyber Risk Assessment. Mohamed Ahmed, Sakshyam Panda, Christos Xenakis, Emmanouil Panaousis |
| 2022 | Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS. Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert |
| 2022 | MalRec: A Blockchain-based Malware Recovery Framework for Internet of Things. Ahmed Lekssays, Giorgia Sirigu, Barbara Carminati, Elena Ferrari |
| 2022 | MetaSEnD: A Security Enabled Development Life Cycle Meta-Model. Daniele Granata, Massimiliano Rak, Giovanni Salzillo |
| 2022 | Model-Based Incident Response Playbooks. Avi Shaked, Yulia Cherdantseva, Pete Burnap |
| 2022 | Modelling privacy harms of compromised personal medical data - beyond data breach. Samuel Wairimu, Lothar Fritsch |
| 2022 | Multi-Account Dashboard for Authentication Dependency Analysis. Daniela Pöhn, Nils Gruschka, Leonhard Ziegler |
| 2022 | Multi-label Classification of Cybersecurity Text with Distant Supervision. Masahiro Ishii, Kento Mori, Ryoichi Kuwana, Satoshi Matsuura |
| 2022 | Network Steganography Through Redundancy in Higher-Radix Floating-Point Representations. Carina Heßeling, Jörg Keller, Sebastian Litzinger |
| 2022 | On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography. Petr Jedlicka, Lukas Malina, Tomas Gerlich, Zdenek Martinasek, Jan Hajny, Petr Socha |
| 2022 | On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages. Marc Ohm, Felix Boes, Christian Bungartz, Michael Meier |
| 2022 | On the feasibility of detecting injections in malicious npm packages. Simone Scalco, Ranindya Paramitha, Duc-Ly Vu, Fabio Massacci |
| 2022 | Parametrization of Probabilistic Risk Models. Sandra König, Abdelkader Magdy Shaaban |
| 2022 | Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications. Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk |
| 2022 | Precise Analysis of Purpose Limitation in Data Flow Diagrams. Hanaa Alshareef, Katja Tuma, Sandro Stucki, Gerardo Schneider, Riccardo Scandariato |
| 2022 | Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms. Bethany Sumner, Gokila Dorai, John Heslen |
| 2022 | Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence. Davy Preuveneers, Wouter Joosen |
| 2022 | Properties for Cybersecurity Awareness Posters' Design and Quality Assessment. Sunil Chaudhary, Marko Kompara, Sebastian Pape, Vasileios Gkioulos |
| 2022 | RIPEMB: A framework for assessing hardware-assisted software security schemes in embedded systems. Stefan Tauner |
| 2022 | Reactive Jamming Detection for LoRaWAN Based on Meta-Data Differencing. Henri Ruotsalainen |
| 2022 | Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials. Petr Dzurenda, Raúl Casanova Marqués, Lukas Malina |
| 2022 | Register Automata for Malware Specification. Tayssir Touili |
| 2022 | Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory. Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda, Stylianos Karagiannis |
| 2022 | Revealing MageCart-like Threats in Favicons via Artificial Intelligence. Massimo Guarascio, Marco Zuppelli, Nunziato Cassavia, Luca Caviglione, Giuseppe Manco |
| 2022 | Reviewing review platforms: a privacy perspective. Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens |
| 2022 | Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective. Salatiel Ezennaya-Gomez, Edgar Blumenthal, Marten Eckardt, Justus Krebs, Christopher Kuo, Julius Porbeck, Emirkan Toplu, Stefan Kiltz, Jana Dittmann |
| 2022 | Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing. Santosh Kumar Upadhyaya, Srinivas Vivek |
| 2022 | Risk Assessments Considering Safety, Security, and Their Interdependencies in OT Environments. Siegfried Hollerer, Thilo Sauter, Wolfgang Kastner |
| 2022 | Rumor and clickbait detection by combining information divergence measures and deep learning techniques. Christian Oliva, Ignacio Palacio Marín, Luis Fernando Lago-Fernández, David Arroyo |
| 2022 | SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET. Mohammed A. Abdelmaguid, Hossam S. Hassanein, Mohammad Zulkernine |
| 2022 | SASP: a Semantic web-based Approach for management of Sharable cybersecurity Playbooks. Mehdi Akbari Gurabi, Avikarsha Mandal, Jan Popanda, Robert Rapp, Stefan Decker |
| 2022 | SMODIC: A Model Checker for Self-modifying Code. Tayssir Touili, Xin Ye |
| 2022 | SOAR4IoT: Securing IoT Assets with Digital Twins. Philip Empl, Daniel Schlette, Daniel Zupfer, Günther Pernul |
| 2022 | STRIPED: A Threat Analysis Method for IoT Systems. Kamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra, Julian Koch, Thorsten Schüppstuhl, Riccardo Scandariato |
| 2022 | Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation Method. Katsuyuki Umezawa, Hiroki Koyanagi, Sven Wohlgemuth, Yusuke Mishina, Kazuo Takaragi |
| 2022 | Scenarios for Process-Aware Insider Attack Detection in Manufacturing. Martin Macák, Radek Vaclavek, Dasa Kusniráková, Raimundas Matulevicius, Barbora Buhnova |
| 2022 | Secret sharing a key in a distributed way, Lagrange vs Newton. Anastassios Voudouris, Ilias Politis, Christos Xenakis |
| 2022 | Secure Mobile Agents on Embedded Boards: a TPM based solution. Antonio Muñoz |
| 2022 | Secure Services for Standard RISC-V Architectures. Davide Bove |
| 2022 | Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis. Engla Rencelj Ling, Jose Eduardo Urrea Cabus, Ismail Butun, Robert Lagerström, Johannes Olegård |
| 2022 | Security Maturity Self-Assessment Framework for Software Development Lifecycle. Raluca Brasoveanu, Yusuf Karabulut, Ivan Pashchenko |
| 2022 | Security Risk Management in Shared Mobility Integration. Abasi-Amefon Obot Affia, Raimundas Matulevicius |
| 2022 | Security of Smart Grid Networks in the Cyber Ranges. Tomás Lieskovan, Jan Hajny |
| 2022 | Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature. Sanaz Adel Alipour, Rita Orji, Nur Zincir-Heywood |
| 2022 | Shedding Light on the Targeted Victim Profiles of Malicious Downloaders. François Labrèche, Enrico Mariconti, Gianluca Stringhini |
| 2022 | Sim2Testbed Transfer: NDN Performance Evaluation. Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Ahmed Taffal |
| 2022 | SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes. Amir Sharif, Matteo Ranzi, Roberto Carbone, Giada Sciarretta, Silvio Ranise |
| 2022 | SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays. Reyhan Düzgün, Naheem Noah, Peter Mayer, Sanchari Das, Melanie Volkamer |
| 2022 | SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools. Emmanouil Samanis, Joseph Gardiner, Awais Rashid |
| 2022 | SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response. Martin Husák, Milan Cermák |
| 2022 | SoK: Combating threats in the digital supply chain. Arne Roar Nygård, Sokratis K. Katsikas |
| 2022 | SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques. Simin Ghesmati, Walid Fdhila, Edgar R. Weippl |
| 2022 | SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices. Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl |
| 2022 | Substation-Aware. An intrusion detection system for the IEC 61850 protocol. Jose Antonio Lopez, Iñaki Angulo, Saturnino Martinez |
| 2022 | Symbolic analysis meets federated learning to enhance malware identifier. Charles-Henry Bertrand Van Ouytsel, Khanh-Huu-The Dam, Axel Legay |
| 2022 | TaxIdMA: Towards a Taxonomy for Attacks related to Identities. Daniela Pöhn, Wolfgang Hommel |
| 2022 | The AssureMOSS security certification scheme. Ákos Milánkovich, Gergely Eberhardt, Dávid Lukács |
| 2022 | The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service. Chrystel Gaber, Ghada Arfaoui, Yannick Carlinet, Nancy Perrot, Laurent Valleyre, Marc Lacoste, Jean-Philippe Wary, Yacine Anser, Rafal Artych, Aleksandra Podlasek, Edgardo Montes de Oca, Vinh Hoa La, Vincent Lefebvre, Gürkan Gür |
| 2022 | The Platform for Czech National Qualifications Framework in Cybersecurity. Jakub Vostoupal, Frantisek Kasl, Pavel Loutocký, Tomás Pitner, Patrik Valo, Adam Valalský, Damián Paranic |
| 2022 | The cybersecurity-related ethical issues of cloud technology and how to avoid them. Aleksandra Pawlicka, Marek Pawlicki, Rafal Renk, Rafal Kozik, Michal Choras |
| 2022 | Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing. Angeliki Aktypi, Dimitris Karnikis, Nikos Vasilakis, Kasper Rasmussen |
| 2022 | Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection. Marek Pawlicki, Rafal Kozik, Michal Choras |
| 2022 | Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection. Cavidan Yakupoglu, Kurt Rohloff |
| 2022 | Towards Image Hashing Robust Against Cropping and Rotation. Martin Steinebach, Tiberius Berwanger, Huajian Liu |
| 2022 | Towards Verifiable Differentially-Private Polling. Gonzalo Munilla Garrido, Johannes Sedlmeir, Matthias Babel |
| 2022 | Towards a Security Benchmark for the Architectural Design of Microservice Applications. Anusha Bambhore Tukaram, Simon Schneider, Nicolás E. Díaz Ferreyra, Georg Simhandl, Uwe Zdun, Riccardo Scandariato |
| 2022 | Trusted and Secure Self-Sovereign Identity framework. Vaios Bolgouras, Anna Angelogianni, Ilias Politis, Christos Xenakis |
| 2022 | UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media. Vaila Leask, Rémi Cogranne, Dirk Borghys, Helena Bruyninckx |
| 2022 | Using Telegram as a carrier for image steganography: Analysing Telegrams API limits. Niklas Bunzel, Tobias Chen, Martin Steinebach |
| 2022 | VALKYRIES: Harmonization and Pre-Standardization of Technology, Training and Tactical Coordinated Operations for First Responders on EU MCI. Yantsislav Yanakiev, Marta Irene García Cid, Jorge Maestre Vidal, Nikolai Stoianov, Marco Antonio Sotelo Monge |
| 2022 | VMIFresh: Efficient and Fresh Caches for Virtual Machine Introspection. Thomas Dangl, Stewart Sentanoe, Hans P. Reiser |
| 2022 | WSL2 Forensics: Detection, Analysis & Revirtualization. Philipp Boigner, Robert Luh |
| 2022 | We cannot trust in you: a study about the dissonance among anti-malware engines. Davide Cocca, Antonio Pirozzi, Corrado Aaron Visaggio |
| 2022 | Web Bot Detection Evasion Using Deep Reinforcement Learning. Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilios Katos, Stefanos Vrochidis, Ioannis Kompatsiaris |
| 2022 | Web Cryptography API: Prevalence and Possible Developer Mistakes. Pascal Wichmann, Maximilian Blochberger, Hannes Federrath |
| 2022 | Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection. Marcin Kowalczyk, Agnieszka Malanowska, Wojciech Mazurczyk, Krzysztof Cabaj |
| 2022 | YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC. Stefan More, Lukas Alber |
| 2022 | ZEKRO: Zero-Knowledge Proof of Integrity Conformance. Heini Bergsson Debes, Thanassis Giannetsos |