ARES B

159 papers

YearTitle / Authors
2022A Collaborative Intelligent Intrusion Response Framework for Smart Electrical Power and Energy Systems.
Konstantinos-Panagiotis Grammatikakis, Ioannis Koufos, Nicholas Kolokotronis
2022A Critique of EU Digital COVID-19 Certificates: Do Vaccine Passports Endanger Privacy?
Harry Halpin
2022A Methodology for enhancing Emergency Situational Awareness through Social Media.
Antonios Karteris, Georgios Tzanos, Lazaros Papadopoulos, Konstantinos P. Demestichas, Dimitrios Soudris, Juliette Pauline Philibert, Carlos López Gómez
2022A Near Real-Time Scheme for Collecting and Analyzing IoT Malware Artifacts at Scale.
Joseph Khoury, Morteza Safaei Pour, Elias Bou-Harb
2022A Quantitative Analysis of Offensive Cyber Operation (OCO) Automation Tools.
Samuel Zurowski, George Lord, Ibrahim M. Baggili
2022A Quantitative Assessment of the Detection Performance of Web Vulnerability Scanners.
Emma Lavens, Pieter Philippaerts, Wouter Joosen
2022A Resilient Network Node for the Industrial Internet of Things.
Lukas Jäger, Dominik Lorych, Michael Eckel
2022A Revisit of Attestable Nodes for Networked Applications.
Mathias Schüpany, Martin Pirker
2022A Synopsis of Critical Aspects for Darknet Research.
Florian Platzer, Alexandra Lux
2022A novel, refined dataset for real-time Network Intrusion Detection.
Mikolaj Komisarek, Marek Pawlicki, Maria-Elena Mihailescu, Darius Mihai, Mihai Carabas, Rafal Kozik, Michal Choras
2022ARES 2022: The 17th International Conference on Availability, Reliability and Security, Vienna,Austria, August 23 - 26, 2022
2022Adding European Cybersecurity Skills Framework into Curricula Designer.
Jan Hajny, Marek Sikora, Athanasios Vasileios Grammatopoulos, Fabio Di Franco
2022All that is Solid Melts into Air: Towards Decentralized Cryptographic Access Control.
Harry Halpin
2022An Early Detection of Android Malware Using System Calls based Machine Learning Model.
Xinrun Zhang, Akshay Mathur, Lei Zhao, Safia Rahmat, Quamar Niyaz, Ahmad Y. Javaid, Xiaoli Yang
2022An Internet-Wide View of Connected Cars: Discovery of Exposed Automotive Devices.
Takahiro Ueda, Takayuki Sasaki, Katsunari Yoshioka, Tsutomu Matsumoto
2022An Investigation of PSA Certified.
SeongHan Shin, Tomoyuki Ogawa, Ryo Fujita, Mari Itoh, Hirotaka Yoshida
2022Analysis and Evaluation of Hardware Trust Anchors in the Automotive Domain.
Christian Plappert, Andreas Fuchs, Ronald Heddergott
2022Analysis and prediction of web proxies misbehavior.
Zahra Nezhadian, Enrico Branca, Natalia Stakhanova
2022Analyzing Coverages of Cyber Insurance Policies Using Ontology.
Markos Charalambous, Aristeidis Farao, George Kalatzantonakis, Panagiotis Kanakakis, Nikos Salamanos, Evangelos Kotsifakos, Evangellos Froudakis
2022Analyzing RRC Replay Attack and Securing Base Station with Practical Method.
Seongmin Park, Ilsun You, Hoonyong Park, Dowon Kim
2022Android Permission Manager, Visual Cues, and their Effect on Privacy Awareness and Privacy Literacy.
Vera Schmitt, Maija Poikela, Sebastian Möller
2022Applying Machine Learning on RSRP-based Features for False Base Station Detection.
Prajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah
2022Applying a cryptographic metric to post-quantum lattice-based signature algorithms.
Markus Rautell, Outi-Marja Latvala, Visa Antero Vallivaara, Kimmo Halunen
2022Assessing discrepancies between network traffic and privacy policies of public sector web services.
Timi Heino, Robin Carlsson, Sampsa Rauti, Ville Leppänen
2022Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104.
László Erdodi, Pallavi Kaliyar, Siv Hilde Houmb, Aida Akbarzadeh, André Jung Waltoft-Olsen
2022Authentication for Operators of Critical Medical Devices: A Contribution to Analysis of Design Trade-offs.
Marwa Gadala, Lorenzo Strigini, Radek Fujdiak
2022Automatic online quantification and prioritization of data protection risks.
Sascha Sven Zmiewski, Jan Laufer, Zoltán Ádám Mann
2022BISCUIT - Blockchain Security Incident Reporting based on Human Observations.
Benedikt Putz, Manfred Vielberth, Günther Pernul
2022Botnet Detection in the Internet of Things through All-in-one Deep Autoencoding.
Marta Catillo, Antonio Pecchia, Umberto Villano
2022Bridging the Gap Between Certification and Software Development.
Claudio A. Ardagna, Nicola Bena, Ramon Martín de Pozuelo
2022Challenging Channels: Encrypted Covert Channels within Challenge-Response Authentication.
Tobias Schmidbauer, Jörg Keller, Steffen Wendzel
2022Classifying the factors affecting the adoption of the SDN-microSENSE innovations.
Theodoros Rokkas, Ioannis Neokosmidis
2022CloudFL: A Zero-Touch Federated Learning Framework for Privacy-aware Sensor Cloud.
Viraaji Mothukuri, Reza M. Parizi, Seyedamin Pouriyeh, Afra Mashhadi
2022Combining Variational Autoencoders and Transformer Language Models for Improved Password Generation.
David Biesner, Kostadin Cvejoski, Rafet Sifa
2022Compiler-Aided Development of Trusted Enclaves with Rust.
Felix Dreissig, Jonas Röckl, Tilo Müller
2022ConSenseIoT: A Consensus Algorithm for Secure and Scalable Blockchain in the IoT context.
Harris Niavis, Konstantinos Loupos
2022Cookie Disclaimers: Impact of Design and Users' Attitude.
Benjamin Maximilian Berens, Heike Dietmann, Chiara Krisam, Oksana Kulyk, Melanie Volkamer
2022CopypastaVulGuard - A browser extension to prevent copy and paste spreading of vulnerable source code in forum posts.
Holger Schmidt, Max van Aerssen, Christian Leich, Abdulkader Benni, Salar Al Ali, Jakob Tanz
2022Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations.
Lukás Sadlek, Pavel Celeda, Daniel Tovarnák
2022Cyber-Security Culture Assessment in Academia: A COVID-19 Study: Applying a Cyber-Security Culture Framework to assess the Academia's resilience and readiness.
Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
2022Cyber-security measures for protecting EPES systems in the 5G area.
Alexios Lekidis
2022Data Acquisition on a Large Darknet Marketplace.
York Yannikos, Julian Heeger, Martin Steinebach
2022Dating Phish: An Analysis of the Life Cycles of Phishing Attacks and Campaigns.
Vincent Drury, Luisa Lux, Ulrike Meyer
2022Deep Reinforcement Learning-Based Defense Strategy Selection.
Axel Charpentier, Nora Boulahia-Cuppens, Frédéric Cuppens, Reda Yaich
2022Demonstration of alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform to Cybersecurity policy, regulatory and legislative advancements.
Dimitrios Skias, Sofia Tsekeridou, Theodore B. Zahariadis, Artemis C. Voulkidis, Terpsichori Helen Velivassaki
2022Design Space Exploration of DICE.
Dominik Lorych, Lukas Jäger
2022Detecting Unknown DGAs without Context Information.
Arthur Drichel, Justus von Brandt, Ulrike Meyer
2022Detection of Malicious Images in Production-Quality Scenarios with the SIMARGL Toolkit.
Luca Caviglione, Martin Grabowski, Kai Gutberlet, Adrian Marzecki, Marco Zuppelli, Andreas Schaffhauser, Wojciech Mazurczyk
2022DevSecOps In Embedded Systems: An Empirical Study Of Past Literature.
Hasan Yasar, Sam E. Teplov
2022Disruptive Quantum Safe Technologies.
Marta Irene García Cid, Jorge Álvaro González, Laura Ortiz Martín, Diego Del Río Gómez
2022Distance-based Techniques for Personal Microbiome Identification✱.
Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart
2022Distributed Enforcement of Access Control policies in Intelligent Transportation System (ITS) for Situation Awareness.
Tahir Ahmad, Umberto Morelli, Silvio Ranise
2022Enhanced Anomaly Detection for Cyber-Attack Detection in Smart Water Distribution Systems.
Branka Stojanovic, Helmut Neuschmied, Martin Winter, Ulrike Kleb
2022Evading Deep Reinforcement Learning-based Network Intrusion Detection with Adversarial Attacks.
Mohamed Amine Merzouk, Joséphine Delas, Christopher Neal, Frédéric Cuppens, Nora Boulahia-Cuppens, Reda Yaich
2022Evaluating The Cyber-Security Culture of the EPES Sector: Applying a Cyber-Security Culture Framework to assess the EPES Sector's resilience and readiness.
Anna Georgiadou, Ariadni Michalitsi-Psarrou, Dimitris Askounis
2022Explainability-based Debugging of Machine Learning for Vulnerability Discovery.
Angelo Sotgiu, Maura Pintor, Battista Biggio
2022FOLPETTI: A Novel Multi-Armed Bandit Smart Attack for Wireless Networks.
Emilie Bout, Alessandro Brighente, Mauro Conti, Valeria Loscrì
2022Fast and Blind Detection of Rate-Distortion-Preserving Video Watermarks.
Hannes Mareen, Glenn Van Wallendael, Peter Lambert, Fouad Khelifi
2022Fault-Tolerant SDN Solution for Cybersecurity Applications.
Athanasios Liatifis, Christos Dalamagkas, Panagiotis I. Radoglou-Grammatikis, Thomas Lagkas, Evangelos Markakis, Valeri M. Mladenov, Panagiotis G. Sarigiannidis
2022Federated learning based IDS approach for the IoV.
Amal Hbaieb, Samiha Ayed, Lamia Chaari
2022FileUploadChecker: Detecting and Sanitizing Malicious File Uploads in Web Applications at the Request Level.
Pascal Wichmann, Alexander Groddeck, Hannes Federrath
2022Forensic analysis of Tor in Windows environment: A case study.
Vaia-Maria Angeli, Ahmad Atamli, Erisa Karafili
2022Fraudulent Activities in the Cyber Realm: DEFRAUDify Project: Fraudulent Activities in the Cyber Realm: DEFRAUDify Project.
Razvan-Alexandru Bratulescu, Robert-Ionut Vatasoiu, Sorina-Andreea Mitroi, George Suciu, Mari-Anais Sachian, Daniel-Marian Dutu, Serban-Emanuel Calescu
2022GTM: Game Theoretic Methodology for optimal cybersecurity defending strategies and investments.
Ioannis Kalderemidis, Aristeidis Farao, Panagiotis Bountakas, Sakshyam Panda, Christos Xenakis
2022Handling Critical Infrastructures in Federation of Cyber Ranges: A Classification Model.
Evangelos Chaskos, Jason Diakoumakos, Nicholas Kolokotronis, George Lepouras
2022Hide and Seek: Privacy-Preserving and FAA-compliant Drones Location Tracing.
Alessandro Brighente, Mauro Conti, Savio Sciancalepore
2022HybridDAD: Detecting DDoS Flooding Attack using Machine Learning with Programmable Switches.
Mostafa Roshani, Mehdi Nobakht
2022Identity and Access Management Framework for Multi-tenant Resources in Hybrid Cloud Computing.
Saurabh Deochake, Vrushali Channapattan
2022Image-based Neural Network Models for Malware Traffic Classification using PCAP to Picture Conversion.
Georgios Agrafiotis, Eftychia Makri, Ioannis Flionis, Antonios Lalas, Konstantinos Votis, Dimitrios Tzovaras
2022Implementation of Revocable Keyed-Verification Anonymous Credentials on Java Card.
Raúl Casanova Marqués, Petr Dzurenda, Jan Hajny
2022Improved Integer-wise Homomorphic Comparison and Division based on Polynomial Evaluation.
Koki Morimura, Daisuke Maeda, Takashi Nishide
2022Improving Network, Data and Application Security for SMEs.
Christos Tselios, Ilias Politis, Christos Xenakis
2022Improving Performance of Machine Learning based Detection of Network Steganography in Industrial Control Systems.
Tom Neubert, Antonio José Caballero Morcillo, Claus Vielhauer
2022Improving Security and Scalability in Smart Grids using Blockchain Technologies.
Mandana Falahi, Andrei Vasilateanu, Nicolae Goga, George Suciu, Mari-Anais Sachian, Robert Florescu, Stefan-Daniel Stanciu
2022Introducing Quantum Computing in Mobile Malware Detection.
Giovanni Ciaramella, Giacomo Iadarola, Francesco Mercaldo, Marco Storto, Antonella Santone, Fabio Martinelli
2022Job Adverts Analyzer for Cybersecurity Skills Needs Evaluation.
Sara Ricci, Marek Sikora, Simon Parker, Imre Lendak, Yianna Danidou, Argyro Chatzopoulou, Remi Badonnel, Donatas Alksnys
2022Joint Security-vs-QoS Framework: Optimizing the Selection of Intrusion Detection Mechanisms in 5G networks.
Arash Bozorgchenani, Charilaos C. Zarakovitis, Su Fong Chien, Heng Siong Lim, Qiang Ni, Antonios Gouglidis, Wissam Mallouli
2022Learning State Machines to Monitor and Detect Anomalies on a Kubernetes Cluster.
Clinton Cao, Agathe Blaise, Sicco Verwer, Filippo Rebecchi
2022Lightweight Parsing and Slicing for Bug Identification in C.
Luca Mecenero, Ranindya Paramitha, Ivan Pashchenko, Fabio Massacci
2022Limitations of Web Cryptojacking Detection: A Practical Evaluation.
Pawel Rajba, Wojciech Mazurczyk
2022Limiting the Size of a Predictive Blacklist While Maintaining Sufficient Accuracy.
Samuel Sulan, Martin Husák
2022MITRE ATT&CK-driven Cyber Risk Assessment.
Mohamed Ahmed, Sakshyam Panda, Christos Xenakis, Emmanouil Panaousis
2022Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS.
Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert
2022MalRec: A Blockchain-based Malware Recovery Framework for Internet of Things.
Ahmed Lekssays, Giorgia Sirigu, Barbara Carminati, Elena Ferrari
2022MetaSEnD: A Security Enabled Development Life Cycle Meta-Model.
Daniele Granata, Massimiliano Rak, Giovanni Salzillo
2022Model-Based Incident Response Playbooks.
Avi Shaked, Yulia Cherdantseva, Pete Burnap
2022Modelling privacy harms of compromised personal medical data - beyond data breach.
Samuel Wairimu, Lothar Fritsch
2022Multi-Account Dashboard for Authentication Dependency Analysis.
Daniela Pöhn, Nils Gruschka, Leonhard Ziegler
2022Multi-label Classification of Cybersecurity Text with Distant Supervision.
Masahiro Ishii, Kento Mori, Ryoichi Kuwana, Satoshi Matsuura
2022Network Steganography Through Redundancy in Higher-Radix Floating-Point Representations.
Carina Heßeling, Jörg Keller, Sebastian Litzinger
2022On Secure and Side-Channel Resistant Hardware Implementations of Post-Quantum Cryptography.
Petr Jedlicka, Lukas Malina, Tomas Gerlich, Zdenek Martinasek, Jan Hajny, Petr Socha
2022On the Feasibility of Supervised Machine Learning for the Detection of Malicious Software Packages.
Marc Ohm, Felix Boes, Christian Bungartz, Michael Meier
2022On the feasibility of detecting injections in malicious npm packages.
Simone Scalco, Ranindya Paramitha, Duc-Ly Vu, Fabio Massacci
2022Parametrization of Probabilistic Risk Models.
Sandra König, Abdelkader Magdy Shaaban
2022Performance Evaluation of DTLS Implementations on RIOT OS for Internet of Things Applications.
Karol Rzepka, Przemyslaw Szary, Krzysztof Cabaj, Wojciech Mazurczyk
2022Precise Analysis of Purpose Limitation in Data Flow Diagrams.
Hanaa Alshareef, Katja Tuma, Sandro Stucki, Gerardo Schneider, Riccardo Scandariato
2022Preliminary Analysis of Privacy Implications Observed in Social-Media Posts Across Shopping Platforms.
Bethany Sumner, Gokila Dorai, John Heslen
2022Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence.
Davy Preuveneers, Wouter Joosen
2022Properties for Cybersecurity Awareness Posters' Design and Quality Assessment.
Sunil Chaudhary, Marko Kompara, Sebastian Pape, Vasileios Gkioulos
2022RIPEMB: A framework for assessing hardware-assisted software security schemes in embedded systems.
Stefan Tauner
2022Reactive Jamming Detection for LoRaWAN Based on Meta-Data Differencing.
Henri Ruotsalainen
2022Real-world Deployment of Privacy-Enhancing Authentication System using Attribute-based Credentials.
Petr Dzurenda, Raúl Casanova Marqués, Lukas Malina
2022Register Automata for Malware Specification.
Tayssir Touili
2022Requirements for an Information Privacy Pedagogy based on the Constructivism Learning Theory.
Thanos Papaioannou, Aggeliki Tsohou, Maria Karyda, Stylianos Karagiannis
2022Revealing MageCart-like Threats in Favicons via Artificial Intelligence.
Massimo Guarascio, Marco Zuppelli, Nunziato Cassavia, Luca Caviglione, Giuseppe Manco
2022Reviewing review platforms: a privacy perspective.
Kevin De Boeck, Jenno Verdonck, Michiel Willocx, Jorn Lapon, Vincent Naessens
2022Revisiting Online Privacy and Security Mechanisms Applied in the In-App Payment Realm from the Consumers' Perspective.
Salatiel Ezennaya-Gomez, Edgar Blumenthal, Marten Eckardt, Justus Krebs, Christopher Kuo, Julius Porbeck, Emirkan Toplu, Stefan Kiltz, Jana Dittmann
2022Revisiting a Privacy-Preserving Location-based Service Protocol using Edge Computing.
Santosh Kumar Upadhyaya, Srinivas Vivek
2022Risk Assessments Considering Safety, Security, and Their Interdependencies in OT Environments.
Siegfried Hollerer, Thilo Sauter, Wolfgang Kastner
2022Rumor and clickbait detection by combining information divergence measures and deep learning techniques.
Christian Oliva, Ignacio Palacio Marín, Luis Fernando Lago-Fernández, David Arroyo
2022SAMM: Situation Awareness with Machine Learning for Misbehavior Detection in VANET.
Mohammed A. Abdelmaguid, Hossam S. Hassanein, Mohammad Zulkernine
2022SASP: a Semantic web-based Approach for management of Sharable cybersecurity Playbooks.
Mehdi Akbari Gurabi, Avikarsha Mandal, Jan Popanda, Robert Rapp, Stefan Decker
2022SMODIC: A Model Checker for Self-modifying Code.
Tayssir Touili, Xin Ye
2022SOAR4IoT: Securing IoT Assets with Digital Twins.
Philip Empl, Daniel Schlette, Daniel Zupfer, Günther Pernul
2022STRIPED: A Threat Analysis Method for IoT Systems.
Kamakshi Srikumar, Komal Kashish, Kolja Eggers, Nicolás E. Díaz Ferreyra, Julian Koch, Thorsten Schüppstuhl, Riccardo Scandariato
2022Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation Method.
Katsuyuki Umezawa, Hiroki Koyanagi, Sven Wohlgemuth, Yusuke Mishina, Kazuo Takaragi
2022Scenarios for Process-Aware Insider Attack Detection in Manufacturing.
Martin Macák, Radek Vaclavek, Dasa Kusniráková, Raimundas Matulevicius, Barbora Buhnova
2022Secret sharing a key in a distributed way, Lagrange vs Newton.
Anastassios Voudouris, Ilias Politis, Christos Xenakis
2022Secure Mobile Agents on Embedded Boards: a TPM based solution.
Antonio Muñoz
2022Secure Services for Standard RISC-V Architectures.
Davide Bove
2022Securing Communication and Identifying Threats in RTUs: A Vulnerability Analysis.
Engla Rencelj Ling, Jose Eduardo Urrea Cabus, Ismail Butun, Robert Lagerström, Johannes Olegård
2022Security Maturity Self-Assessment Framework for Software Development Lifecycle.
Raluca Brasoveanu, Yusuf Karabulut, Ivan Pashchenko
2022Security Risk Management in Shared Mobility Integration.
Abasi-Amefon Obot Affia, Raimundas Matulevicius
2022Security of Smart Grid Networks in the Cyber Ranges.
Tomás Lieskovan, Jan Hajny
2022Security of Social Networks: Lessons Learned on Twitter Bot Analysis in the Literature.
Sanaz Adel Alipour, Rita Orji, Nur Zincir-Heywood
2022Shedding Light on the Targeted Victim Profiles of Malicious Downloaders.
François Labrèche, Enrico Mariconti, Gianluca Stringhini
2022Sim2Testbed Transfer: NDN Performance Evaluation.
Enkeleda Bardhi, Mauro Conti, Riccardo Lazzeretti, Eleonora Losiouk, Ahmed Taffal
2022SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes.
Amir Sharif, Matteo Ranzi, Roberto Carbone, Giada Sciarretta, Silvio Ranise
2022SoK: A Systematic Literature Review of Knowledge-Based Authentication on Augmented Reality Head-Mounted Displays.
Reyhan Düzgün, Naheem Noah, Peter Mayer, Sanchari Das, Melanie Volkamer
2022SoK: A Taxonomy for Contrasting Industrial Control Systems Asset Discovery Tools.
Emmanouil Samanis, Joseph Gardiner, Awais Rashid
2022SoK: Applications and Challenges of using Recommender Systems in Cybersecurity Incident Handling and Response.
Martin Husák, Milan Cermák
2022SoK: Combating threats in the digital supply chain.
Arne Roar Nygård, Sokratis K. Katsikas
2022SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques.
Simin Ghesmati, Walid Fdhila, Edgar R. Weippl
2022SoK: Security of Microservice Applications: A Practitioners' Perspective on Challenges and Best Practices.
Priyanka Billawa, Anusha Bambhore Tukaram, Nicolás E. Díaz Ferreyra, Jan-Philipp Steghöfer, Riccardo Scandariato, Georg Simhandl
2022Substation-Aware. An intrusion detection system for the IEC 61850 protocol.
Jose Antonio Lopez, Iñaki Angulo, Saturnino Martinez
2022Symbolic analysis meets federated learning to enhance malware identifier.
Charles-Henry Bertrand Van Ouytsel, Khanh-Huu-The Dam, Axel Legay
2022TaxIdMA: Towards a Taxonomy for Attacks related to Identities.
Daniela Pöhn, Wolfgang Hommel
2022The AssureMOSS security certification scheme.
Ákos Milánkovich, Gergely Eberhardt, Dávid Lukács
2022The Owner, the Provider and the Subcontractors: How to Handle Accountability and Liability Management for 5G End to End Service.
Chrystel Gaber, Ghada Arfaoui, Yannick Carlinet, Nancy Perrot, Laurent Valleyre, Marc Lacoste, Jean-Philippe Wary, Yacine Anser, Rafal Artych, Aleksandra Podlasek, Edgardo Montes de Oca, Vinh Hoa La, Vincent Lefebvre, Gürkan Gür
2022The Platform for Czech National Qualifications Framework in Cybersecurity.
Jakub Vostoupal, Frantisek Kasl, Pavel Loutocký, Tomás Pitner, Patrik Valo, Adam Valalský, Damián Paranic
2022The cybersecurity-related ethical issues of cloud technology and how to avoid them.
Aleksandra Pawlicka, Marek Pawlicki, Rafal Renk, Rafal Kozik, Michal Choras
2022Themis: A Secure Decentralized Framework for Microservice Interaction in Serverless Computing.
Angeliki Aktypi, Dimitris Karnikis, Nikos Vasilakis, Kasper Rasmussen
2022Towards Deployment Shift Inhibition Through Transfer Learning in Network Intrusion Detection.
Marek Pawlicki, Rafal Kozik, Michal Choras
2022Towards Efficient FHE Based cPIR Schemes and Their Parameter Selection.
Cavidan Yakupoglu, Kurt Rohloff
2022Towards Image Hashing Robust Against Cropping and Rotation.
Martin Steinebach, Tiberius Berwanger, Huajian Liu
2022Towards Verifiable Differentially-Private Polling.
Gonzalo Munilla Garrido, Johannes Sedlmeir, Matthias Babel
2022Towards a Security Benchmark for the Architectural Design of Microservice Applications.
Anusha Bambhore Tukaram, Simon Schneider, Nicolás E. Díaz Ferreyra, Georg Simhandl, Uwe Zdun, Riccardo Scandariato
2022Trusted and Secure Self-Sovereign Identity framework.
Vaios Bolgouras, Anna Angelogianni, Ilias Politis, Christos Xenakis
2022UNCOVER: Development of an efficient steganalysis framework for uncovering hidden data in digital media.
Vaila Leask, Rémi Cogranne, Dirk Borghys, Helena Bruyninckx
2022Using Telegram as a carrier for image steganography: Analysing Telegrams API limits.
Niklas Bunzel, Tobias Chen, Martin Steinebach
2022VALKYRIES: Harmonization and Pre-Standardization of Technology, Training and Tactical Coordinated Operations for First Responders on EU MCI.
Yantsislav Yanakiev, Marta Irene García Cid, Jorge Maestre Vidal, Nikolai Stoianov, Marco Antonio Sotelo Monge
2022VMIFresh: Efficient and Fresh Caches for Virtual Machine Introspection.
Thomas Dangl, Stewart Sentanoe, Hans P. Reiser
2022WSL2 Forensics: Detection, Analysis & Revirtualization.
Philipp Boigner, Robert Luh
2022We cannot trust in you: a study about the dissonance among anti-malware engines.
Davide Cocca, Antonio Pirozzi, Corrado Aaron Visaggio
2022Web Bot Detection Evasion Using Deep Reinforcement Learning.
Christos Iliou, Theodoros Kostoulas, Theodora Tsikrika, Vasilios Katos, Stefanos Vrochidis, Ioannis Kompatsiaris
2022Web Cryptography API: Prevalence and Possible Developer Mistakes.
Pascal Wichmann, Maximilian Blochberger, Hannes Federrath
2022Web Page Harvesting for Automatized Large-scale Digital Images Anomaly Detection.
Marcin Kowalczyk, Agnieszka Malanowska, Wojciech Mazurczyk, Krzysztof Cabaj
2022YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC.
Stefan More, Lukas Alber
2022ZEKRO: Zero-Knowledge Proof of Integrity Conformance.
Heini Bergsson Debes, Thanassis Giannetsos